


default search action
ICFNDS 2018: Amman, Jordan
- Abdelrahman Abuarqoub, Bamidele Adebisi, Mohammad Hammoudeh, Sharefa Murad, Mounir Arioua:
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018. ACM 2018 - Jibran Saleem, Mohammad Hammoudeh
, Umar Raza
, Bamidele Adebisi
, Ruth Ande:
IoT standardisation: challenges, perspectives and solution. 1:1-1:9 - Muhammad Usman
, Muhammad Rizwan Asghar
, Fabrizio Granelli, Khalid A. Qaraqe
:
Integrating smart city applications in 5G networks. 2:1-2:5 - Umar Farooq, Ihsan Rabbi
, Kashif Zia
, Syeda Zohra Israr, Muneeba Shereen:
Quicker re-allocation of regions in opensimulator framework. 3:1-3:7 - Hanan Mustapha, Ahmed M. Alghamdi:
DDoS attacks on the internet of things and their prevention methods. 4:1-4:5 - Amjad Rattrout
, Adwan Yasin
, Mahmoud Abu-Zant, Mariam Yasin, Mohammed Dwaikat:
Clustering algorithm for AODV routing protocol based on artificial bee colony in MANET. 5:1-5:9 - Hamza Aldabbas
:
LPBR: location prediction based routing protocol for mobile IoT systems. 6:1-6:5 - Karim Soliman, Marwa El Shenawy, Ahmed Abou El Farag:
Loop unrolling effect on parallel code optimization. 7:1-7:6 - Waleed Abdallah, Mohamad Khdair, Mosab Ayyash, Issa Asad:
IoT system to control greenhouse agriculture based on the needs of Palestinian farmers. 8:1-8:9 - Mohammed Al-Khafajiy
, Lee Webster, Thar Baker
, Atif Waraich:
Towards fog driven IoT healthcare: challenges and framework of fog computing in healthcare. 9:1-9:7 - Ayoub Bahnasse
, Abdelmajid Badri
, Mohamed Talea
, Fatima Ezzahraa Louhab, Adel Al-Harbi
, Azeddine Khiat
, Said Broumi
:
Wimax technology for maritime intelligent transport systems communication. 10:1-10:8 - Abdallah Qusef
, Mais Arafat, Samar Al-Taher:
Organizational management role in information security management system. 11:1-11:8 - George Sammour
, Lina Sharawi:
Market segmentation and analysis of online shopping in Jordan and the region. 12:1-12:7 - Khaled Day
, Nasser Alzeidi, Abderezak Touzene:
Multipath routing in a 3D torus network on chip. 13:1-13:8 - Duha Shubair, Imtiaz Ahmed, Maytham Safar
:
A survey on IoT contribution in smart goods ordering cycle: Amazon buttons. 14:1-14:8 - Fadi Draidi, Mohammad Hmedat, Barakat Abwe, Amr Atrash:
CryptDBaaS: query over encrypted DBaaS without third-party. 15:1-15:7 - Ayah Atiyah, Sufyan Almajali
:
A traffic tracking algorithm for a fast detection of active network sources. 16:1-16:6 - Ahmed A. Abusnaina, Sobhi Ahmad, Radi Jarrar, Majdi M. Mafarja
:
Training neural networks using Salp Swarm Algorithm for pattern classification. 17:1-17:6 - Majdi M. Mafarja
, Radi Jarrar, Sobhi Ahmad, Ahmed A. Abusnaina:
Feature selection using binary particle swarm optimization with time varying inertia weight strategies. 18:1-18:9 - Majdi M. Mafarja
, Nasser R. Sabar:
Rank based binary particle swarm optimisation for feature selection in classification. 19:1-19:6 - Goh Wen Bin, Sohail Safdar, Rehan Akbar, Suresh Subramanian
:
Graphical authentication based on anti-shoulder surfing mechanism. 20:1-20:6 - M. Tariq Banday
:
A study of current trends in the design of processors for the internet of things. 21:1-21:10 - Aktham Sawan
, Rashid Jayousi:
Analysis of social network for telecommunication companies. 22:1-22:7 - AbedAlqader Swedan, Ahmad N. Khuffash, Othman Othman, Ahmed Awad:
Detection and prevention of malicious cryptocurrency mining on internet-connected devices. 23:1-23:10 - Slamet Kristanto Tirto Utomo, Takeo Hamada
, Noboru Koshizuka:
Low-energy smart trash bin architecture for dynamic waste collection system. 24:1-24:7 - Shadi Rasheed Masadeh, Hamza Abbass Al-Sewadi, Mohammed Abbas Fadhil Al-Husainy
:
Embedded key cryptosystem for cloud computing applications. 25:1-25:7 - Abdelkader Laouid, Muath AlShaikh, Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Madani Bezoui, Habib Aissaoua, Abdelkamel Tari:
A distributed security protocol designed for the context of internet of things. 26:1-26:5 - Abdel-Rahman Hedar
, Gamal A. El-Sayed
:
Parallel genetic algorithm with elite and diverse cores for solving the minimum connected dominating set problem in wireless networks topology control. 27:1-27:9 - Khalid Mansour:
A new mechanism for textual password hardening using adopted typing rhythm. 28:1-28:8 - Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, Fatna Belqasmi:
Malware detection using DNS records and domain name features. 29:1-29:7 - Reda Shaheen, Safina Kanwal, Rimsha Iftikhar, Muhammad Rehman Shahid:
Evaluating health information apps on real life smart phone use. 30:1-30:6 - Nael Zidan, Mohammed Maree
, Subhi Samhan:
An IoT based monitoring and controlling system for water chlorination treatment. 31:1-31:6 - Malik Hasnain, Mazhar Hussain Malik, Mehmet Emin Aydin
:
An adaptive opportunistic routing scheme for reliable data delivery in WSNs. 32:1-32:7 - Hala Jodeh, Aisha Mikkawi, Ahmed Awad, Othman Othman:
Comparative analysis of routing protocols for under-water wireless sensor networks. 33:1-33:7 - Georgios L. Stavrinides, Helen D. Karatza
:
Scheduling techniques for complex workloads in distributed systems. 34:1-34:6 - Mohammed Amine Yagoub, Abdelkader Laouid
, Okba Kazar
, Ahcène Bounceur, Reinhardt Euler, Muath AlShaikh
:
An adaptive and efficient fully homomorphic encryption technique. 35:1-35:6 - Madani Bezoui, Ahcène Bounceur, Loïc Lagadec
, Reinhardt Euler, Mohammad Hammoudeh
, Abdelkader Laouid, Abdelkamel Tari:
Detecting gaps and voids in WSNs and IoT networks: the angle-based method. 36:1-36:7 - Ahcène Bounceur, Madani Bezoui
, Loïc Lagadec
, Reinhardt Euler, Abdelkader Laouid
, Mahamadou Traore, Mounir Lallali:
Detecting gaps and voids in WSNs and IoT networks: the minimum x-coordinate based method. 37:1-37:7 - Habib Aissaoua, Makhlouf Aliouat, Ahcène Bounceur, Reinhardt Euler, Abdelkader Laouid, Farid Lalem, Abdelkamel Tari:
A lightweight only receiver clock synchronization technique for wireless sensor networks. 38:1-38:6 - Amr Abu Abdo, Raffi Al-Qurran, Wail Mardini:
Enhanced routing algorithm based on depth traversal in software defined wireless sensor networks. 39:1-39:5 - Haneen Shehadeh, Wail Mardini, Muneer O. Bani Yassein
, Doaa Habeeb Allah, Waed Bani Yaseen:
"Hop count" dynamic double trickle timer algorithm use case: data aggregation in smart green house. 40:1-40:7 - Wafaa M. Salih Abedi:
Unconsciousness detection supervision system using faster RCNN architecture. 41:1-41:6 - Jayashree Agarkhed, Ashalatha. R, Siddarama R. Patil
:
An efficient privacy preserving cryptographic approach in cloud computing. 42:1-42:10 - Kelvin O. O. Anoh, Augustine Ikpehai, Dragana Bajovic, Olamide Jogunola
, Bamidele Adebisi
, Dejan Vukobratovic
, Mohammad Hammoudeh
:
Virtual microgrids: a management concept for peer-to-peer energy trading. 43:1-43:5 - Ibrahim Ghafir, Vaclav Prenosil
, Mohammad Hammoudeh
, Francisco J. Aparicio-Navarro
, Khaled M. Rabie, Ahmad Jabban:
Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat. 44:1-44:5 - Daniel Kelly, Mohammad Hammoudeh
:
Optimisation of the public key encryption infrastructure for the internet of things. 45:1-45:5 - Andy Kuszyk, Mohammad Hammoudeh
:
Contemporary alternatives to traditional processor design in the post Moore's law era. 46:1-46:5 - Ghulam Mustafa, Rehan Ashraf, Muhammad Ayzed Mirza, Abid Jamil, Muhammad:
A review of data security and cryptographic techniques in IoT based devices. 47:1-47:9 - Muhammad Asghar Khan
, Inam Ullah Khan, Ijaz Mansoor Qureshi, Muhammad Kashif Alam, Syed Bilal Hussain Shah, Muhammad Shafiq:
Deployment of reliable, simple, and cost-effective medium access control protocols for multi-layer flying ad-hoc networks. 49:1-49:5 - Abid Jamil, Kashif Asif, Rehan Ashraf, Sheraz Mehmood, Ghulam Mustafa:
A comprehensive study of cyber attacks & counter measures for web systems. 50:1-50:7 - Inam Ullah Khan, Ijaz Mansoor Qureshi, Muhammad Asghar Khan
, Syed Bilal Hussain Shah, Imran Shafique Ansari, Muhammad Hamza Akhlaq:
Ant colony based optimization technique to mitigate dynamic routing challenges in packet based networks. 51:1-51:5 - Muhammad Irshad
, Wenyuan Liu, Lin Wang, Syed Bilal Hussian Shah, Sohail Muhammad Noman, Muhammad Musa Uba:
Li-local: green communication modulations for indoor localization. 52:1-52:6 - Syed Bilal Hussain Shah, Zhe Chen, Syed Hassan Ahmed, Fuliang Yin, Muhammad Faheem, Seema Begum:
Depth based routing protocol using smart clustered sensor nodes in underwater WSN. 53:1-53:7 - Naeem Raza
, Sohail Jabbar
, Jihun Han, Kijun Han:
Social vehicle-to-everything (V2X) communication model for intelligent transportation systems based on 5G scenario. 54:1-54:8 - Laiqa Binte Imran
, Muhammad Farhan
, Rana M. Amir Latif
, Ahsan Rafiq:
Design of an IoT based warfare car robot using sensor network connectivity. 55:1-55:8 - Khurram Shahzad, Abdul Moiz, Usman Ahmed, Syed Jawad Hussain, Khalid Hussain
, Ahthasham Sajid
:
Violent material detection system. 56:1-56:3 - Ammar Muthanna
, Abdelhamied A. Ateya
, Maria Makolkina
, Anastasia Vybornova
, Ekaterina V. Markova
, Alexander Gogol, Andrey Koucheryavy
:
SDN multi-controller networks with load balanced. 57:1-57:6 - Abdelhamied A. Ateya
, Anastasia Vybornova
, Ammar Muthanna
, Ekaterina V. Markova
, Irina A. Gudkova
, Alexander Gogol, Andrey Koucheryavy
:
Key solutions for light limitations: toward tactile internet system realization. 58:1-58:6 - Ekaterina G. Medvedeva
, Elvira R. Zaripova, Irina A. Gudkova
, Oksana Semenova, Anastasiya S. Vlaskina
, Yuliya Gaidamaka
:
Discrete time markov chain model for analyzing characteristics of RACH procedure under massive machine type communications. 59:1-59:5 - Mais Arafat:
Information security management system challenges within a cloud computing environment. 60:1-60:6 - Sohail Jabbar
, Kaleem Razzaq Malik, Mudassar Ahmad:
Real-time RDF adaptation model for smart human-care querying in IoT based mobile applications. 61:1-61:5 - Abdukodir Khakimov
, Abdelhamied A. Ateya
, Ammar Muthanna
, Irina A. Gudkova
, Ekaterina V. Markova
, Andrey Koucheryavy
:
IoT-fog based system structure with SDN enabled. 62:1-62:6 - Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia
:
Distributed solution of scalar multiplication on elliptic curves over Fp for resource-constrained networks. 63:1-63:6 - Bamidele Adebisi:
Transactive energy systems: what has communications got to do with it? 64:1 - Kelvin O. O. Anoh:
Advances in PAPR reduction for OFDM systems with machine learning. 65:1 - Humaira Nadeem, Imran Mujaddid Rabbani, Muhammad Aslam, Ana María Martínez Enríquez:
KNN-fuzzy classification for cloud service selection. 66:1-66:8 - Subhan Arif, Muhammad Umair, Syed Muhammad Kumail Naqvi, Ahmad Ikram, Anam Ikram:
Detection of bowler's strong and weak area in cricket through commentary. 67:1-67:14 - Shatha H. Jafier:
Utilizing feature selection techniques in intrusion detection system for internet of things. 68:1-68:3 - Asad Jameel, Khurram Shahzad, Afia Zafar, Usman Ahmed, Syed Jawad Hussain, Ahthasham Sajid
:
The users experience quality of responsive web design on multiple devices. 69:1-69:6 - Attia Nafees Ul Haq, Khurram Shahzad, Usman Ahmed, Syed Jawad Hussain, Ahthasham Sajid
:
Web technologies used for virtual classroom. 70:1-70:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.