default search action
7th ISNCC 2020: Montreal, QC, Canada
- 2020 International Symposium on Networks, Computers and Communications, ISNCC 2020, Montreal, QC, Canada, October 20-22, 2020. IEEE 2020, ISBN 978-1-7281-5628-6
- Osama I. Aloqaily, Paola Flocchini, Nicola Santoro:
Achieving Immortality in Wireless Rechargeable Sensor Networks Using Local Learning. 1-6 - Arnav Bhandari, Katherine Juarez, Errin W. Fulp:
Using Execution Profiles to Identify Process Behavior Classes. 1-4 - Mohammed Najah Mahdi, Abdul Rahim Ahmad, Roslan Ismail, Mohammed Ahmed Subhi:
Review of Techniques in Faceted Search Applications. 1-5 - Yogesh Pawar, Manar Amayri, Nizar Bouguila:
Performance Evaluation of Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation. 1-6 - Kurdman Abdulrahman Rasol Rasol, Jordi Domingo-Pascual:
Joint Placement Latency Optimization of the Control Plane. 1-6 - Alain Richard Ndjiongue, Telex Magloire Nkouatchah Ngatched:
LED-based Energy Harvesting Systems for Modern Mobile Terminals. 1-6 - Ravi Potluri, Kristen Young:
Analytics Automation for Service Orchestration. 1-4 - Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. 1-7 - Amna Eleyan, Joshua Fallon:
IoT-based Home Automation Using Android Application. 1-4 - Satyam Pandey, Manoj Prem Siddaiah Mahadevaiah, Vipul Shrikant Deshpande:
Intelligent Frames for occupants safety in Automobiles. 1-8 - Foroutan Fami, Chuan Pham, Kim Khoa Nguyen:
Towards IoT Slicing for Centralized WLANs in Enterprise Networks. 1-6 - Iman Vakilinia, Mohammad Jafari, Deepak K. Tosh, Shahin Vakilinia:
Privacy Preserving Path Planning in an Adversarial Zone. 1-6 - Ghassan Fadlallah, Hamid Mcheick, Djamal Rebaine:
Internet-of-Things (IoT) Shortest Path Algorithms and Communication Case Studies for Maintaining Connectivity in Harsh Environements. 1-8 - Pantea Koochemeshkian, Narges Manouchehri, Nizar Bouguila:
Bivariate Beta Regression Model and Its Medical Applications. 1-5 - Fangqing Tan, Peiran Wu, Minghua Xia:
Energy-Efficient Power Allocation for Non-Orthogonal Multicast and Unicast Transmission of Cell-Free Massive MIMO Systems. 1-6 - Sally Ismail, Fabio D'Andreagiovanni, Hicham Lakhlef, Youcef Imine:
Recent Advances on 5G Resource Allocation Problem using PD-NOMA. 1-7 - Danish Sattar, Ashraf Matrawy:
Proactive and Dynamic Slice Allocation in Sliced 5G Core Networks. 1-8 - Dana Haj Hussein, Ragunath Anbarasu, Ashraf Matrawy, Mohamed Ibnkahla:
Towards a Decentralized Access Control System for IoT Platforms based on Blockchain Technology. 1-6 - Danilo Brito Teixeira de Almeida, Marcelo Sampaio de Alencar, Wamberto José Lira de Queiroz, Rafael Moura Duarte, Waslon Terllizzie Araujo Lopes, Hugerles Sales Silva:
Performance of Cell-Free Systems in Generalized Fading Channels. 1-5 - Sèmèvo Arnaud R. M. Ahouandjinou, Emmanuel Nataf, Aldric Monnou, Frimin Yelouassi:
Smart Wireless network for data collection using mobile Sink embedded on drone based on a modified RPL-version. 1-6 - Olusola Tolulope Odeyomi:
Truth Prediction by Weakly Connected Agents in Social Networks Using Online Learning. 1-5 - Khandaker Abir Rahman, Noor Alam, Jarin Musarrat, Anusha Madarapu, Md. Shafaeat Hossain:
Smartwatch Dynamics: A Novel Modality and Solution to Attacks on Cyber-behavioral Biometrics for Continuous Verification? 1-5 - A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Optimizing Virtual Machine Migration in Multi-Clouds. 1-7 - Hugo de Mello Dantas, Claudio Miceli de Farias:
A data fusion algorithm for clinically relevant anomaly detection in remote health monitoring. 1-8 - Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, Thar Baker:
AI and machine learning: A mixed blessing for cybersecurity. 1-7 - Serguei A. Mokhov, Jashanjot Singh, Haotao Lai, Konstantinos Psimoulis, Joey Paquet:
OpenISS as a Near-Realtime Composable Broadcast Service for Performing Arts and Beyond. 1-6 - Hongyan Zhang, Yue Xiao, Bin Fu, Xiaotian Zhou:
Artificial Noise-aided Spatial and Directional Modulation Systems for Secure Transmission. 1-5 - Gurdeep Singh, Urvinder Singh:
Analysis of Triple Band Rejected Compact Planar Octagon shape Monopole Antenna for UWB Applications. 1-6 - Pavel Yermalovich:
Dashboard Visualization Techniques in Information Security. 1-6 - Yanal Alahmad, Anjali Agarwal, Tariq Daradkeh:
Cost and Availability-Aware VNF Selection and Placement for Network Services in NFV. 1-6 - Jihene Rezgui, Clément Bisaillon, Léonard Oest O'Leary:
A platform for Sharing Artificial Intelligence Algorithms in Autonomous Driving : An overview of Enhanced LAOP. 1-6 - Anna Christina Situmorang, Nico Febry Yoshua, Dadang Gunawan:
Analysis of Interference Mitigation between Earth Station - High Throughput Satellite towards 5G Terrestrial Network in 28 GHz Co-channel Frequency. 1-5 - Evelina Pencheva, Ivaylo Asenov, Ivaylo Atanasov, Ventsislav G. Trifonov:
Programmability of Policy Control at the Edge of the Mobile Network. 1-6 - Hazem M. Soliman:
An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise Networks. 1-6 - Yuri Cotrado Sehgelmeble, Stefan Fischer:
A Different Perspective in Routing for VANETs. 1-4 - Amine Dahane, Rabaie Benameur, Kechar Bouabdellah, A. Benyamina:
An IoT Based Smart Farming System Using Machine Learning. 1-6 - Stefan Neumeier, Simon Stapf, Christian Facchi:
The Visual Quality of Teleoperated Driving Scenarios How good is good enough? 1-8 - Iman I. M. Abu Sulayman, Abdelkader Ouda:
Designing Security User Profiles via Anomaly Detection for User Authentication. 1-6 - Jashanjot Singh, Serguei A. Mokhov, Joey Paquet:
Enabling Real-time Gesture Recognition Data Delivery over ROS and OpenISS. 1-6 - Yean-Fu Wen:
Resource Pre-allocation for Cooperative Sensing to Achieve End-to-end Delay Fairness in CRNs. 1-6 - Lev B. Levitin, Yelena Rykalova:
Virtual Cut-Through Routing in Multidimensional Interconnection Networks. 1-6 - Aviroop Ghosh, Karina Gomez Chavez, Sithamparanathan Kandeepan:
Congestion Mitigation using Non-Cooperative Game Theory in LTE Base Stations. 1-6 - Ersin Ünsal, Bilgehan Öztekin, Murat Çavus, Suat Özdemir:
Building a Fintech Ecosystem: Design and Development of a Fintech API Gateway. 1-5 - Marcus Chan, Mingwei Gong, Ranesh Kumar Naha, Aniket Mahanti:
Piracy on the Internet: Publisher-side Analysis on File Hosting Services. 1-7 - Abdanaser Okaf, Dongyu Qiu:
Analysis of Blockage Impact on Handover Rate for User with Mobility in 5G mm-Wave Cellular Network. 1-6 - Affan Affan, Usama Khan, Hafiz Muhammad Asif, Kammran Raahemifar:
Multiuser Visible Light Communication System using Hybrid OFDM-PWM. 1-6 - Ravi Chauhan, Shahram Shah-Heydari:
Polymorphic Adversarial DDoS attack on IDS using GAN. 1-6 - Iqra Mustafa, Ching-Yao Huang:
Lightweight cryptographic URLLC for 5G-V2X. 1-6 - Luz E. Marquez, Maria Calle, Juan Carlos Velez Diaz:
Modeling LoRa: a Complex Envelope Approach. 1-6 - Fatima Lamia Haddi, Mahfoud Benchaïba, Jihene Rezgui, Tarek Bejaoui:
Peers Classification and Monitoring in a P2P System. 1-6 - Bingyue Su, Fang Liu:
Utility Analysis of Horizontally Merged Multi-Party Synthetic Data with Differential Privacy. 1-7 - Shanhong Liu, Radu Muresan, Arafat Al-Dweik:
Leveraging Deep Learning for Inattentive Driving Behavior with In-Vehicle Cameras. 1-6 - Rana Abou Khamis, Ashraf Matrawy:
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. 1-6 - Clive Sugama, V. Chandrasekar:
Triple Cassegrain Parabolic Stacked Antenna for Radio Frequency System Consolidation. 1-4 - Samridhi, Ramiro Liscano, Akramul Azim, Abdul Zainul Abedin, Brian Pulito, Yee-Kang Chang:
Failure Scenarios for SIP/RTP services in Container Orchestration Clusters. 1-6 - Karol Niewiadomski, Dietmar Tutsch:
Low-power Concepts for FPGAs in Applications with limited Energy Resources. 1-8 - Amamer Saied, Dongyu Qiu:
Resource Allocation for Device-to-Device (D2D) Communications of Uplink Multi-Cell Networks. 1-6 - Ampratwum Isaac Owusu, Amiya Nayak:
A Framework for QoS-based Routing in SDNs Using Deep Learning. 1-6 - Ruksin Kamal, Ajai John Chemmanam, Bijoy Antony Jose, Sunil Mathews, Eldho Varghese:
Construction Safety Surveillance Using Machine Learning. 1-6 - Newton Masinde, Moritz Kanzler, Kalman Graffi:
Caching Structures for Distributed Data Management in P2P-based Social Networks. 1-8 - Ahmed Shafee:
Botnets and their detection techniques. 1-6 - Carlos Martínez Santander, Hugo Oswaldo Moreno, Myriam Beatriz Hernandez Alvarez:
The evolution from Traditional to Intelligent Web Security: Systematic Literature Review. 1-9 - Michele Luglio, Mattia Quadrini, Simon Pietro Romano, Cesare Roseti, Francesco Zampognaro:
Enabling an efficient satellite-terrestrial hybrid transport service through a QUIC-based proxy function. 1-6 - Marouane Hachimi, Georges Kaddoum, Ghyslain Gagnon, Poulmanogo Illy:
Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks. 1-5 - Shadi Danesh, Ali Araghi, Mohsen Khalily, Pei Xiao, Rahim Tafazolli:
Millimeter Wave Phased Array Antenna Synthesis Using a Machine Learning Technique for Different 5G Applications. 1-5 - Rodrique Chi Fon, Alain Richard Ndjiongue, Khmaies Ouahada:
Machine to Machine Based on Visible Light Communication for IoTs. 1-6 - Abderazek Chaka Bannour, Rim Moussa, Tarek Bejaoui:
Real-Time Tracking of Aircrafts in Crowdsourced Air Traffic Networks with Simple Localization Estimates. 1-6 - Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
A Framework for Automated Monitoring and Orchestration of Cloud-Native applications. 1-6 - Ke Yan, Xian-Zhong Xie:
Performance Analysis of Cooperative Bidirectional Relay in Cognitive Radio Network with Energy Harvesting. 1-6 - Sebastian Fischer, Katerina Katsarou, Oliver Holschke:
DeepFlow: Towards Network-Wide Ingress Traffic Prediction Using Machine Learning At Large Scale. 1-8 - Igor Kabashkin, Vadim Philippov:
Fault Tolerance of Multi-Channel Radio Network with Dynamic Spectrum Access Strategy in Air Traffic Management Systems. 1-6 - Ahmad Abdo, Khaled Maamoun, Claude D'Amours, Hussein T. Mouftah:
Proactive Disturbance-Aware Routing within Software-Defined Networking. 1-5 - Sameera Siddiqui, Dimitrios Makrakis:
Mpls-Based Micro-Mobility Architecture for 5g Vehicular Visible Light Communication Networks. 1-7 - Áine MacDermott, John Carr, Qi Shi, Mohd Rizuan Baharon, Gyu Myoung Lee:
Privacy Preserving Issues in the Dynamic Internet of Things (IoT). 1-6 - Gabriela Sobreira de Carvalho, Marcelo Sampaio de Alencar, Raíssa Bezerra Rocha:
Capacity Heat Maps for Millimeter Waves. 1-4 - Hossein Amirinia, Ramiro Liscano:
Optimized Application Driven Scheduling for Clustered WSN. 1-6 - Tibor Beke, Esko Dijk, Tanir Ozcelebi, Richard Verhoeven:
Time Synchronization in IoT Mesh Networks. 1-8 - Mengxin Zhou, Wuling Liu, Jiliang Zhang, Xiaoli Chu:
Joint Impact of BS Height and Downtilt on Downlink Data Rate in mmWave Networks with 3D Large-Scale Antenna Arrays. 1-5 - Amamer Saied, Dongyu Qiu, Mahmoud Swessi:
Resource Management Based on Reinforcement Learning for D2D Communication in Cellular Networks. 1-6 - Md. Shafaeat Hossain, Carl Haberfeld, Kate Yuan, Jundong Chen, Khandaker Abir Rahman, Ishtiaque Hussain:
Continuous Authentication Using Creative Writing. 1-6 - Md. Hafizur Rahman, Nizar Bouguila:
Probabilistic Features on Simplex Manifold in Predictive Data Modelling. 1-6 - Njakarison Menja Randriamasinoro, Kim Khoa Nguyen, Mohamed Cheriet:
A Non-Cooperative transportation game to optimize resource allocation in edge-cloud environment. 1-6 - Aghiles Djoudi, Rafik Zitouni, Nawel Zangar, Laurent George:
Reconfiguration of LoRa Networks Parameters using Fuzzy C-Means Clustering. 1-6 - Fairouz Chehbour, Zouina Doukha, Samira Moussaoui, Mohamed Guerroumi:
Congestion Aware Data Collection with Mobile Sinks in Smart City. 1-7 - Jean-Frédéric Wagen, Victor Adalid, Yann Maret:
Comparing OLSRd, d2 and -Q Using an Emulated 802.11 or TDMA MANET in a 2-ring Topology. 1-5 - Shan Luan, Yan Zhang, Hongyan Zhang, Yanping Xiao, Yue Xiao, Bin Fu:
Secure Hybrid Analog and Digital Precoding for Massive MIMO Systems. 1-5 - Rostislav Axamitnyy, Alexander Aric, Serguei A. Mokhov, Joey Paquet, Sudhir P. Mudur:
OpenISS IoT Camera Simulation Environment for Real-time IoT Forensics and Incident Response. 1-8 - Fatma Najar, Nuha Zamzami, Nizar Bouguila:
Recognition of human interactions in feature films based on infinite mixture of EDCM. 1-6 - Yasmeen Ali, Anwar Haque, Bassel Bitar:
Towards the Development of a Novel Service Cost Modeling: An ISP Perspective. 1-7 - Mohamed I. Ibrahem, Mahmoud M. Badr, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Zubair Md. Fadlullah:
PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI Networks. 1-7 - Thomas Kunz:
Routing Solutions for Hierarchical MANETs. 1-6 - Md. Al Maruf, Akramul Azim, Sourojit Mukherjee:
Mushroom Demand Prediction Using Machine Learning Algorithms. 1-6 - Chih-Hao Lin, Wen-Yuan Chen, Ping-Sheng Lin:
A Decentralized Tree-based Algorithm for Reliable Blockchain Communications. 1-6 - Yilun Liu, Yiheng Gui, Shuai Yuan, Jixuan Liu, Lidong Zhu:
Terrestrial-Satellite Secure Communication with Non-confidential User Assistance and Hybrid-Power. 1-6 - Md. Mainul Islam Mamun, Deep Medhi, Cory C. Beard:
CP-Less MIMO Discrete Fourier Transform Spread OFDM. 1-6 - Waheb A. Jabbar, Roshahliza M. Ramli, Mahamod Ismail:
Comparative Performance Analysis of MBQA-OLSRv2 and MBMA-OLSRv2 Routing Protocols in MANETs. 1-6 - Shunki Shinohara, Noriharu Miyaho:
Novel highly secure distributed e-mail system. 1-4 - Tahar Haddad, Naim Ben-Hamida, Sadok Aouini, Jihene Rezgui:
Seizure Prediction with a Single iEEG Electrode Using Non-linear Techniques. 1-6 - Kabo Elliot Pule, Mohammad Hossein Anisi, Faiyaz Doctor, Hani Hagras:
Multiple UAV based Spatio-Temporal Task Assignment using Fast Elitist Multi Objective Evolutionary Approaches. 1-8 - Jean-Frédéric Wagen:
Diffuse Scattering and Specular Reflection from Facets of Arbitrary Size and Roughness using the Computer Graphics GGX Model. 1-5 - Aviroop Ghosh, Karina Gomez Chavez, Sithamparanathan Kandeepan:
LTE Base Station Congestion Mitigation using Game Theory and Radio Resource Allocation Techniques. 1-6 - Tariq Daradkeh, Anjali Agarwal, Yanal Alahmad:
Multiple Attributes K-Means Clustering for Elastic Cloud Model. 1-6 - Jihene Rezgui, Émile Gagné, Guillaume Blain:
Autonomous Learning Intelligent Vehicles Engineering: ALIVE 1.0. 1-6 - Nesrine Zaghdoud, Adel Ben Mnaouer, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati:
Secrecy Performance of AF/DF relaying in NOMA Systems using Average and Instantaneous Channel gain for users' ranking. 1-7 - Khaled M. Eshteiwi, Bassant Selim, Georges Kaddoum:
Full Duplex of V2V Cooperative Relaying over Cascaded Nakagami-m Fading Channels. 1-5 - Simon Huneault-LeBlanc, Chamseddine Talhi:
P-Code Based Classification to Detect Malicious VBA Macro. 1-6 - Abdelhamid Mammeri, Abdul Jabbar Siddiqui, Yiheng Zhao, Barry R. Pekilis:
Vulnerable Road Users Detection based on Convolutional Neural Networks. 1-6 - Pavel Yermalovich, Mohamed Mejri:
Information security risk assessment based on decomposition probability via Bayesian Network. 1-8 - Taotao Wang, Soung Chang Liew, Shengli Zhang:
PubChain: A Decentralized Open-Access Publication Platform with Participants Incentivized by Blockchain Technology. 1-8 - Reza Soltani, Uyen Trang Nguyen, Aijun An:
Decentralized and Privacy-Preserving Key Management Model. 1-7 - Aizaz U. Chaudhry, Namitha Jacob, Dils George, Roshdy H. M. Hafez:
On Evaluating Independent Set Heuristics for Wireless Backhaul Network Capacity of 5G Ultra-Dense Networks. 1-6 - Saad Inshi, Rasel Chowdhury, Mahdi Elarbi, Hakima Ould-Slimane, Chamseddine Talhi:
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications. 1-6 - Zhenghao Zhang:
The Zenith Scheme: A Novel Modulation Technique for MIMO OFDM Systems with 2D-FFT. 1-4 - Rafael Moura Duarte, Marcelo Sampaio de Alencar, Wamberto José Lira de Queiroz, Danilo Brito Teixeira de Almeida, Fabrício Braga Soares de Carvalho, Waslon Terllizzie Araujo Lopes:
Performance of Mixed Channel Cell-Free Systems. 1-5 - Joel Sommers:
A Web Client Perspective on IP Geolocation Accuracy. 1-8 - Anouar Rkhami, Pham Tran Anh Quang, Yassine Hadjadj Aoul, Abdelkader Outtagarts, Gerardo Rubino:
On the Use of Graph Neural Networks for Virtual Network Embedding. 1-6 - Rashid Ali, Zulqarnain, Sung Won Kim, Hyung Seok Kim:
Exponentially Distributed Random Access in LTE-A networks. 1-5 - Bhaskar Ghosh, Indira Kalyan Dutta, Albert H. Carlson, Michael W. Totaro:
Mathematical Modeling and Prediction of Neural Network Training based on RC Circuits. 1-4 - Md. Al Maruf, Anil Singh, Akramul Azim, Nitin Auluck:
Resource efficient allocation of fog nodes for faster vehicular OTA updates. 1-6 - Tucker Clark, Evan Brock, Dalei Wu, Yu Liang:
Development of Real-Time Smart City Mapping Utilizing Game Engines. 1-6 - Zhelin Yu, Lidong Zhu:
A New Approach for Analyzing the Cycle Structure of a Class of LFSRs. 1-6 - Lauren J. Wong, Emily Altland, Joshua Detwiler, Paolo Fermin, Julia Mahon Kuzin, Nathan Moeliono, Abdelrahman Said Abdalla, William C. Headley, Alan J. Michaels:
Resilience Improvements for Space-Based Radio Frequency Machine Learning. 1-5 - Hafiz Usman Tahseen, Lixia Yang, Saad Uddin:
Submarine Antenna Performance with Novel Shaped Sandwich-Wall Radome. 1-6 - Oyeniyi Akeem Alimi, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Kuburat Oyeranti Adefemi Alimi:
Empirical Comparison of Machine Learning Algorithms for Mitigating Power Systems Intrusion Attacks. 1-5 - Jeongwon Seo, Mingwei Gong, Ranesh Kumar Naha, Aniket Mahanti:
A Realistic and Efficient Real-time Plant Environment Simulator. 1-6 - Berat Yilmaz, Ertugrul Barak, Suat Ozdemir:
Improving WebRTC Security via Blockchain Based Smart Contracts. 1-6 - Shinelle Hutchinson, Umit Karabiyik:
Forensic Analysis of the August Smart Device Ecosystem. 1-7 - Alexey Gorodetskiy, Andrey E. Serebryakov, Alma Oracevic, Rasheed Hussain, S. M. Ahsan Kazmi:
Towards a Secure and Efficient Location-based Secret Sharing Protocol. 1-6 - Tale Saeidi, Sarmad Nozad Mahmood, Asnor Juraiza Ishak, Sameer Alani, Shahid M. Ali, Idris Ismail, Adam Reda Hasan Alhawari:
Miniaturized Spiral UWB Transparent Wearable Flexible Antenna for Breast Cancer Detection. 1-6 - Nima Souzandeh, Mansoor Dashti Ardakani, Sonia Aïssa, Serioja Ovidiu Tatu:
Frequency Selective CMOS RF-to-DC Rectifier for Wireless Power and RFID Applications. 1-6 - Rasha Jamal Atwa, Paola Flocchini, Amiya Nayak:
Risk-based Trust Evaluation Model for VANETs. 1-6 - Yuxuan Pan, Xiaowen Peng, Xuexian Lin, Minghua Xia:
Prototype Development of Face and Speaker Recognitions based on Edge Computing. 1-5 - Muhib Al-kmali, Hamzah Mugahed, Wadii Boulila, Mohammed Al-Sarem, Anmar Abuhamdah:
A Machine-Learning based Approach to Support Academic Decision-Making at Higher Educational Institutions. 1-5 - Jema Sharin PankiRaj, Abdulsalam Yassine, Salimur Choudhury:
Incentive-based Peer-to-Peer Distributed Energy Trading in Smart Grid Systems. 1-6 - Chengjie Li, Lidong Zhu, Zhongqiang Luo, Zhen Zhang:
Solutions to Data Reception with Improve Blind Source Separation in Satellite Communications. 1-5 - Arinjita Paul, Vorapong Suppakitpaisarn, Mitali Bafna, C. Pandu Rangan:
Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering. 1-6 - Lamia Chaari, Sana Chahbani, Jihene Rezgui:
Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication Systems. 1-6 - Norman Yap, Mingwei Gong, Ranesh Kumar Naha, Aniket Mahanti:
Machine Learning-based Modelling for Museum Visitations Prediction. 1-7 - Nouman Bashir, Saadi Boudjit:
A Collision Avoiding Packet Scheduling and Energy-Efficient Routing Technique for Video Wireless Sensor Networks. 1-6 - Amir Djenna, Djamel-Eddine Saïdouni, Wafia Abada:
A Pragmatic Cybersecurity Strategies for Combating IoT-Cyberattacks. 1-6 - Ivaylo Atanasov, Evelina Pencheva, Denitsa Velkova, Ventsislav G. Trifonov:
Opening the Network Edge for Programmability of Mission Critical Session Control. 1-6 - Soheyb Ribouh, Yassin Elhillali, Atika Rivenq:
Multiple Sequential Constraint Removal Algorithm For Channel Estimation In Vehicular Environment. 1-7 - Masoud Barati, George Theodorakopoulos, Omer F. Rana:
Automating GDPR Compliance Verification for Cloud-hosted Services. 1-6 - Khaled Hamouid, Kamel Adi:
Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging. 1-6 - Shinobu Ogiso, Masami Mohri, Yoshiaki Shiraishi:
Transparent Provable Data Possession Scheme for Cloud Storage. 1-5 - Luoyao Hao, Henning Schulzrinne:
When Directory Design Meets Data Explosion: Rethinking Query Performance for IoT. 1-6 - Marwen Abdennebi, Nawel Zangar, Saloua Hendaoui:
Distance Aware Radio Planning for SDN Based 5G-Satellite Network. 1-7 - Stephen Ugwuanyi, Jidapa Hansawangkit, James Irvine:
NB-IoT Testbed for Industrial Internet of Things. 1-6 - Sahar Mohamed Ghanem, Donia Naief Saad Aldeen:
AltCC: Alternating Clustering and Classification for Batch Analysis of Malware Behavior. 1-6 - Branislav Mladenov, Georgi Iliev:
Searching for Optimal Software Defined Network Controller Against DDoS Attacks. 1-4 - Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone. 1-6 - Mohammad Reza Faghani, Uyen Trang Nguyen:
Unmasking Magnet, a Novel Malware on Facebook. 1-4 - Fahad E. Salamh, Umit Karabiyik, Marcus K. Rogers:
Asynchronous Forensic Investigative Approach to Recover Deleted Data from Instant Messaging Applications. 1-6 - Anurag Thantharate, Cory C. Beard, Sreekar Marupaduga:
A Thermal Aware Approach to Enhance 5G Device Performance and Reliability in mmWave Networks. 1-5 - Eric Yocam:
Narrow-band Internet of Things Protocol Standards: Survey of Security and Privacy Control Effectiveness. 1-6 - Jihene Rezgui, Thomas Trépanier, David Génois, Hervé Claden, Amasten Ameziani:
Intelligent Fruit Maturity Assessment Platform Using Convolutional Neural Network: IFMAP. 1-6 - Peyman Derafshkavian, Simon Huneault-LeBlanc, Sacha Renault-Crispo, Akansha Marwaha, Serguei A. Mokhov, Joey Paquet:
Toward Scalable Demand-Driven JSON-to-Forensic Lucid Encoder in GIPSY. 1-6 - Lamiaa Basyoni, Aiman Erbad, Amr Mohamed, Ahmed Refaey, Mohsen Guizani:
Proportionally Fair approach for Tor's Circuits Scheduling. 1-6 - Meysam Goodarzi, Nebojsa Maletic, Jesús Gutiérrez, Eckhard Grass:
Bayesian Joint Synchronization and Localization Based on Asymmetric Time-stamp Exchange. 1-7 - Manas Pratim Bhattacharya, Pavol Zavarsky, Sergey Butakov:
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain. 1-7 - Vahid Heydari:
A New Security Framework for Remote Patient Monitoring Devices. 1-4 - Stephen Ugwuanyi, James Irvine:
Security Analysis of IoT Networks and Platforms. 1-6 - Feng Wei, Uyen Trang Nguyen:
A Lightweight Deep Neural Model for SMS Spam Detection. 1-6 - Yao Liang, Xiaodong Ju, Meishan Wang, Peng Liu, Chuanwei Li, Li Ma:
The Design of Logging while Drilling's Data Acquisition & Processing System based on High Data Rate Miller code. 1-5 - Amani Altarawneh, Anthony Skjellum:
The Security Ingredients for Correct and Byzantine Fault-tolerant Blockchain Consensus Algorithms. 1-9 - Iman I. M. Abu Sulayman, Abdelkader Ouda:
Human Trait Analysis via Machine Learning Techniques for User Authentication. 1-10 - Nolan H. Hamilton, Eddie Allan, Errin W. Fulp:
Cluster Analysis of Passive DNS Features for Identifying Domain Shadowing Infrastructure. 1-4 - Leila Ismail, Huned Materwala, Youssef Sharaf:
BlockHR - A Blockchain-based Healthcare Records Management Framework: Performance Evaluation and Comparison with Client/Server Architecture. 1-8 - Vinícius Oliveira, Lucas Duarte, Gabriel Costa, Marcielly Macêdo, Tagleorge Marques Silveira:
Automation System for Six-minute Walk Test Using RFID Technology. 1-6 - Mohammad Abediankasgari, Mohsen Khalily, Shadi Danesh, Pei Xiao, Rahim Tafazolli:
Reconfigurable Dielectric Resonator Antenna Using an Inverted U-shaped Slot. 1-5 - Omar A. Yeste Ojeda, Nolan Denman, Jacob Wegman, Stephen Wunduke:
The SCREAM Concept for the Next-Generation Very Large Array Central Signal Processor. 1-4 - Karanbir Singh Ghai, Abdulsalam Yassine, Salimur Choudhury:
A Fair VNF Assignment Algorithm for Network Functions Virtualization. 1-6 - Maggie Ezzat Gaber Gendy, Ahmad Al-Kabbany, Ehab Farouk Badran:
Green Crowdsensing by Learning Inter-Auction Mappings and Non-local Graph Constraints. 1-4 - Muath Obaidat, Joseph Brown:
Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication. 1-4 - Yang Li, Xinjie Gu, Lilin Dan, Ranran He, Xing Mao, Yue Xiao:
Improved OFDM Waveform for Radio Link in Non-terrestrial Network. 1-6 - Miraz Uz Zaman, Manki Min:
Decentrally-Consented-Server-Based Blockchain System for Universal Types of Data. 1-6 - Alain Richard Ndjiongue, Telex Magloire Nkouatchah Ngatched:
Outage Probability of a CSK Transmission in Visible Light Communications Systems. 1-6 - Nahman Tariq, Ivan Petrunin, Antonios Tsourdos, Saba Al-Rubaye:
External Synchronisation in Time-Triggered Networks. 1-7 - Samridhi, Ramiro Liscano:
Performance comparison of a Software Defined and Wireless Sensor Network. 1-6 - Aizaz U. Chaudhry, Mital Raithatha, Roshdy H. M. Hafez, John W. Chinneck:
Using Machine Learning to Locate Gateways in the Wireless Backhaul of 5G Ultra-Dense Networks. 1-5 - Mohammed Bin Hariz, Dhaou Said, Hussein T. Mouftah:
Game Theoretic Approach for a Multi-Mode Transportation in Smart Cities. 1-6 - Yogesh Pawar, Nuha Zamzami, Nizar Bouguila:
An Effective Hybrid Anomaly Detection System Based on Mixture Models. 1-6 - Saloua Hendaoui, Aza Mannai, Nawel Zangar:
Cognitive CQI/5QI Based Scheme for Software Defined 5G Hybrid Satellite-Terrestrial Network: Slicing for Ultra Reliability And Video Congestion Offloading. 1-7 - Houssein Boud, Raveendra K. Rao:
On Application of MUSIC Algorithm to Doppler Estimation for Aeronautical Satellite OFDM. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.