


default search action
NTMS 2015: Paris, France
- Mohamad Badra, Azzedine Boukerche, Pascal Urien:
7th International Conference on New Technologies, Mobility and Security, NTMS 2015, Paris, France, July 27-29, 2015. IEEE 2015, ISBN 978-1-4799-8784-9 - Fariborz Entezami, Christos Politis
:
3DPBARP: A three dimensions position based adaptive real-time routing protocol for wireless sensor networks. 1-5 - Randika Upathilake, Yingkun Li, Ashraf Matrawy:
A classification of web browser fingerprinting techniques. 1-5 - Omessaad Hamdi, Maïssa Mbaye, Francine Krief:
A cloud-based architecture for network attack signature learning. 1-5 - Ke Ke, Yixi Xie, Yongjie Liu, Chao Hua:
A cognitive two-way relay transmission scheme based on adaptive QAM and wireless network coding. 1-4 - Riccardo Pecori
:
A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems. 1-5 - Israel L. C. Vasconcelos, David H. S. Lima, Carlos Maurício S. Figueiredo, André L. L. de Aquino:
A coverage algorithm for intermittently connected delay tolerant wireless sensor networks. 1-5 - Hitoshi Nakao, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie:
A database driven data channel selection scheme for V2V communication over TV white space. 1-5 - Yuma Moroi, Kazumasa Takami:
A method of securing priority-use routes for emergency vehicles using inter-vehicle and vehicle-road communication. 1-5 - Dragos Ioan Sacaleanu, Lucian Andrei Perisoara, Rodica Stoian, Vasile Lazarescu:
A new energy saving framework for long lasting wireless sensor nodes. 1-5 - Mohamad Badra, Elyes Ben Hamida:
A novel cryptography based privacy preserving solution for urban mobility and traffic control. 1-5 - Sana Tmar-Ben Hamida, Beena Ahmed
:
A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis. 1-2 - Claudio Correa, Jo Ueyama
, Rodolfo Ipolito Meneguette, Leandro A. Villas, Geraldo P. R. Filho:
Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings. 1-5 - Siddhartha Asthana, Pushpendra Singh, Shraddha Jain:
Adaptive framework for data transmission over GSM voice channel for developing regions. 1-5 - Karel Heurtefeux, Nasreen Mohsin
, Hamid Menouar:
An hybrid platform for remote health monitoring: From concept to deployment. 1-2 - Dhouha Ayed, Marie-Noëlle Lepareux, Cyrille Martins:
Analysis of XACML policies with ASP. 1-5 - Cong Sun, Yi-hua Zhu, Liyong Yuan, Kaikai Chi:
Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks. 1-7 - Oriol Pinol Pinol, Shahid Raza
, Joakim Eriksson, Thiemo Voigt:
BSD-based elliptic curve cryptography for the open Internet of Things. 1-5 - Mohamed A. Aboul Hassan
, Mohamad Yassin, Samer Lahoud
, Marc Ibrahim
, Dany Mezher, Bernard Cousin
, Essam A. Sourour:
Classification and comparative analysis of inter-cell interference coordination techniques in LTE networks. 1-6 - Diulie J. Freitas
, Tiago B. Marcondes, Luis Hideo Vasconcelos Nakamura
, Jo Ueyama
, Pedro Henrique Gomes
, Rodolfo Ipolito Meneguette:
Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people. 1-5 - Martin Ussath, Feng Cheng, Christoph Meinel:
Concept for a security investigation framework. 1-5 - Michael Strasser, Sahin Albayrak
:
Conceptual architecture for self-discovering in fragmented service systems. 1-5 - Gustavo Gonzalez Granadillo, Joaquín García-Alfaro
, Hervé Debar
, Christophe Ponchel, Laura Rodriguez Martin:
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs). 1-6 - Xavier Pons Masbernat, Christophe Gruet, Eric Georgeaux, Lirida A. B. Naviner
:
D2D broadcast communications for 4G PMR networks. 1-5 - Leandro Aparecido Villas:
Data dissemination in vehicular networks: Challenges, solutions, and future perspectives. 1-5 - Abdelhamid Mammeri, Guangqian Lu, Azzedine Boukerche:
Design of lane keeping assist system for autonomous vehicles. 1-5 - Mahmud Rasih Çelenlioglu, Mohammed Alsadi, Haci Ali Mantar:
Design, implementation and evaluation of SDN-based resource management model. 1-5 - Daishi Irie, Shinya Kurimoto, Hiroyoshi Miwa:
Detecting critical protected links to keep connectivity to servers against link failures. 1-5 - Mingchang Zhao, Abdelhamid Mammeri, Azzedine Boukerche:
Distance measurement system for smart vehicles. 1-5 - Andrej Stefanov:
Distortion analysis of underwater acoustic sensor networks. 1-4 - Medhat H. M. Elsayed, Amr Mohamed
:
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation. 1-5 - Luis Hideo Vasconcelos Nakamura
, Pedro Felipe do Prado, Rafael Mira De Oliveira Libardi, Luiz Henrique Nunes, Rodolfo Ipolito Meneguette, Júlio Cezar Estrella, Regina H. C. Santana, Marcos José Santana, Stephan Reiff-Marganiec
:
Efficient web services selection based on QoS through a distributed parallel semantic approach. 1-5 - Yoann Foquet, Dritan Nace:
Elastic flow rerouting. 1 - Jinsong Hu, Mao Wang, Kingsley Jun Zou, Kristo Wenjie Yang, Min Hua
, Jingjing Zhang:
Enhanced LTE physical downlink control channel design for machine-type communications. 1-5 - Yuichi Kumano, Shingo Ata, Nobuyuki Nakamura, Yoshihiro Nakahira, Ikuo Oka:
Enhancing immediacy of identification with multi-stage application identification. 1-2 - Erick Donato, Edmundo R. M. Madeira
, Leandro A. Villas:
Impact of desynchronization problem in 1609.4/WAVE multi-channel operation. 1-5 - Nasser Al-Ostath, Fatma Selityn, Zainab Al-Roudhan, Mohammed El-Abd
:
Implementation of an emergency vehicle to traffic lights communication system. 1-5 - Luan Cardoso dos Santos, Guilherme Rodrigues Bilar, Fábio Dacêncio Pereira:
Implementation of the fully homomorphic encryption scheme over integers with shorter keys. 1-5 - Tassos Dimitriou, Ebrahim A. Alrashed, Mehmet Hakan Karaata, Ali Hamdan:
Imposter detection for replication attacks in mobile sensor networks. 1-5 - João M. G. Duarte, Eduardo Cerqueira, Leandro A. Villas:
Indoor patient monitoring through Wi-Fi and mobile computing. 1-5 - Luciano Jerez Chaves, Vitor Marge Eichemberger, Islene Calciolari Garcia
, Edmundo Roberto Mauro Madeira
:
Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks. 1-5 - Chuyen Khoa Huynh, Thanh Mai Nguyen Hoang, Won Cheol Lee:
Interference avoidance for TVWS smart metering system by optimization assignment problem. 1-5 - Miguel Colom, Bertrand Kerautret, Nicolas Limare, Pascal Monasse, Jean-Michel Morel
:
IPOL: A new journal for fully reproducible research; analysis of four years development. 1-5 - Florent Calvayrac
:
Kullback-Leibler divergence as an estimate of reproducibility of numerical results. 1-5 - Leila Ben Saad, Bernard Tourancheau:
Lifetime optimization of sensor-cloud systems. 1-5 - Victor Tortorello, Luis Hideo Vasconcelos Nakamura
, Daniel C. Lobato, Rodolfo Ipolito Meneguette:
MASCA: MAnagement of simultaneous connectivity for applications. 1-5 - Manfred Sneps-Sneppe, Dmitry Namiot
:
Metadata in SDN API for WSN. 1-5 - Allan Mariano de Souza
, Roberto Sadao Yokoyama, Guilherme Maia, Antonio Alfredo Ferreira Loureiro, Leandro A. Villas:
Minimizing traffic jams in urban Centers using vehicular ad hoc networks. 1-5 - Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:
Mining social networks for software vulnerabilities monitoring. 1-7 - Kuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif
:
Modeling information flow properties with UML. 1-5 - Fatna Belqasmi
, May El Barachi
, José M. Alcaraz Calero
, Mohamad Badra, Omar Alfandi
:
NGNaaS: NGNs as cloud computing services. 1-6 - Philippe Langlois, Rafife Nheili, Christophe Denis:
Numerical reproducibility: Feasibility issues. 1-5 - Mikhail Zolotukhin, Timo Hämäläinen
, Tero Kokkonen, Jarmo Siltanen:
Online detection of anomalous network flows with soft clustering. 1-5 - Hikmat Farhat
, Guillaume Feuillade:
On-the-fly algorithm for the service composition problem. 1-6 - Heba Raafat Ahmed, Essam A. Sourour, Hassan M. Elkamchouchi:
Performance of joint transmission CoMP with global precoding matrix and IRC receiver for LTE-A. 1-5 - Soha Farhat, Abed Ellatif Samhat
, Samer Lahoud
, Bernard Cousin
:
Pricing strategies in multi-operator heterogeneous wireless networks. 1-5 - Nobuyuki Teraura, Kouichi Sakurai:
Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones. 1-5 - João Paulo Just Peixoto
, Daniel G. Costa
:
QoE-aware multiple sinks mobility in wireless sensor networks. 1-4 - Aymen Boudguiga
, Antoine Boulanger, Pascale Chiron, Witold Klaudel, Houda Labiod, Jean-Christophe Seguy:
RACE: Risk analysis for cooperative engines. 1-5 - Thomas Pfeiffenberger, Jia Lei Du, Pedro Bittencourt Arruda, Alessandro Anzaloni:
Reliable and flexible communications for power systems: Fault-tolerant multicast with SDN/OpenFlow. 1-6 - Garvita Bajaj, Pushpendra Singh:
Sahyog: A middleware for mobile collaborative applications. 1-5 - Cherif Ghazel
, Leïla Azouz Saïdane:
Satisfying QoS requirements in NGN networks using an optimized resource control and management method. 1-5 - Pierpaolo Cincilla, Arnaud Kaiser, Brigitte Lonc, Houda Labiod, Remi Blancher, Christophe Jouvray, Richard Denis, Antoine Boulanger:
Security of C-ITS messages: A practical solution the ISE project demonstrator. 1-2 - Collins Mtita, Maryline Laurent
, Pascal Daragon:
Serverless lightweight mutual authentication protocol for small mobile computing devices. 1-5 - Mohamed Lahby
, Silki Baghla
, Abderrahim Sekkaki:
Survey and comparison of MADM methods for network selection access in heterogeneous networks. 1-6 - Serhat Gezgin, Emel Uras, Emre Eroglu, Levent Altay, Serif Bahtiyar
, Gürkan Gür
:
System modeling and risk analysis using AADL for critical infrastructure security. 1-2 - Shaolei Chen, Chuangmu Yao, Rui Dai:
The design of a rateless channel coding scheme for deep-space communication. 1-5 - Kashif Habib, Wolfgang Leister
:
Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures. 1-5 - Kevan Adlard, Tharanga Ekanayake, Ashraf Matrawy:
Towards power profiling of Android permissions. 1-5 - Sebastian Abt, Reinhard Stampp, Harald Baier:
Towards reproducible cyber-security research through complex node automation. 1-5 - Ijaz Ahmad
, Suneth Namal, Mika Ylianttila
, Andrei V. Gurtov
:
Towards software defined cognitive networking. 1-5 - Riccardo Pecori
:
Trust-based storage in a Kademlia network infected by Sybils. 1-5 - P. J. C. Nel, M. J. Thinus Booysen, Brink van der Merwe:
Using thermal transients at the outlet of electrical water heaters to recognise consumption patterns for heating schedule optimisation. 1-5 - Saravanan Yuvaraja
, A. Stree Vithya:
UV glass sensor. 1-5 - Budoor Bawazeer
, Nadine Akkari Adra
, Ghadah Aldabbagh, Nikos Dimitriou
:
WiFi/WhiteFi handover: Signaling and performance. 1-6 - David Selvakumar, Kaushik Nanda, Hari Babu Pasupuleti:
Wireless sensor device hardware architecture - Design and analysis for high availability. 1-5 - Mario Köppen, Masato Tsuru:
Zonal fairness in wireless infrastructure. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.