default search action
10th NTMS 2019: Canary Islands, Spain
- 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019, Canary Islands, Spain, June 24-26, 2019. IEEE 2019, ISBN 978-1-7281-1542-9
NTMS
- Tatu Ylönen:
SSH Key Management Challenges and Requirements. 1-5 - Dragos Ioan Sacaleanu, Irina Petra Manciu, Lucian Andrei Perisoara:
Performance Analysis of LoRa Technology in Wireless Sensor Networks. 1-5 - Jun Zhang, Houda Labiod, Weizhi Meng:
A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites. 1-5 - Ye Hu, Mingzhe Chen, Walid Saad:
Competitive Market for Joint Access and Backhaul Resource Allocation in Satellite-Drone Networks. 1-5 - Ievgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka, Peter Langendörfer:
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods. 1-7 - Ivaylo Atanasov, Evelina Pencheva, Ivaylo Asenov:
Mobile Edge Assistance Information for Radio Access Network Optimization. 1-5 - Un-Sook Choi, Sung Jin Cho, Sung Won Kang:
Color Medical Image Encryption using 3D Chaotic Cat Map and NCA. 1-5 - Christina Chaccour, Ramy Amer, Bo Zhou, Walid Saad:
On the Reliability of Wireless Virtual Reality at Terahertz (THz) Frequencies. 1-5 - Muhammad Imran Khan, Simon N. Foley, Barry O'Sullivan:
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings. 1-5 - Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. 1-6 - Fadlallah Chbib, Lyes Khoukhi, Walid Fahs, Rida Khatoun, Jamal Haydar:
Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks. 1-7 - Adrian Mizzi, Joshua Ellul, Gordon J. Pace:
Porthos: Macroprogramming Blockchain Systems. 1-5 - Rodion Yakoubovsky, Viliam Sarian:
IoT in Effective Distance Learning Process. 1-4 - Dora Lapkova, David Malaník, Lukas Kralik, Lukas Kotek:
Cybersecurity in Protection of Soft Targets. 1-6 - Djedjiga Mouheb, Masa Hilal Abushamleh, Maya Hilal Abushamleh, Zaher Al Aghbari, Ibrahim Kamel:
Real-Time Detection of Cyberbullying in Arabic Twitter Streams. 1-5 - Francesco Zola, Cristina Pérez-Solà, Jon Egaña Zubia, Maria Eguimendia, Jordi Herrera-Joancomartí:
Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance. 1-5 - Radek Fujdiak, Petr Blazek, Petr Mlynek, Jiri Misurec:
Developing Battery of Vulnerability Tests for Industrial Control Systems. 1-5 - Slim Trabelsi:
Monitoring Leaked Confidential Data. 1-5 - Vatsal J. Saglani, Bharat S. Rawal, V. Vijayakumar, Longzhi Yang:
Big Data Technology in Healthcare: A Survey. 1-5 - Yehuda Rudin, Itamar Levi, Alexander Fish, Osnat Keren:
FPGA Implementation of pAsynch Design Paradigm. 1-5 - Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko, Yannick Chevalier:
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems. 1-5 - Sarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marín-Tordera, Alejandro Jurnet, Jordi Garcia, Ana Juan Ferrer, Ester Simó:
Balancing Security Guarantees vs QoS Provisioning in Combined Fog-to-Cloud Systems. 1-6 - Evelina Pencheva, Ivaylo Atanasov, Ivaylo Asenov, Ventsislav G. Trifonov:
Mobility Management as a Radio Access Network Service. 1-5 - Claude Fachkha:
Cyber Threat Investigation of SCADA Modbus Activities. 1-7 - Heena Rathore, Abhay Samant, Mohsen Guizani:
A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking. 1-5 - Mounira Msahli, Houda Labiod, Gilles Ampt:
Security Interoperability for Cooperative ITS: Architecture and Validation. 1-6 - Harm Griffioen, Christian Doerr:
Taxonomy and Adversarial Strategies of Random Subdomain Attacks. 1-5 - Samy Kambou, Ahmed Bouabdallah:
Improving Strong Mobile Authentication with Structural Diversity and User-Friendliness. 1-5 - Evgeny S. Sagatov, Andrei M. Sukhov:
Assessment Technologies of Communication Quality in MANET Networks. 1-5 - Pascal Urien:
Introducing Innovative Bare Metal Crypto Terminal for Blockchains and BigBang Paradigm. 1-4 - Santiago Figueroa, Javier Añorga, Saioa Arrizabalaga, Iñigo Irigoyen, Mario Monterde:
An Attribute-Based Access Control using Chaincode in RFID Systems. 1-5 - David Zooker Zabib, Alexander Fish, Osnat Keren, Yoav Weizman:
Compact Sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security Applications. 1-5 - Farah Haidar, Arnaud Kaiser, Brigitte Lonc, Pascal Urien:
Risk Analysis on C-ITS Pseudonymity Aspects. 1-5 - Antoine Saverimoutou, Bertrand Mathieu, Sandrine Vaton:
Influence of Internet Protocols and CDN on Web Browsing. 1-5 - Monika Di Angelo, Gernot Salzer:
Collateral Use of Deployment Code for Smart Contracts in Ethereum. 1-5 - Salam Ismail Rasheed Khanji, Mohamad Badra, Omar Alfandi, Rouba Borghol:
Urban Sensing: Towards Security Efficient Sensing Network Scheme. 1-7 - Syed Naqvi, Sean Enderby, Ian Williams, Waqar Asif, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea:
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities. 1-6 - Ahmed Badr, Laura Rafferty, Qusay H. Mahmoud, Khalid Elgazzar, Patrick C. K. Hung:
A Permissioned Blockchain-Based System for Verification of Academic Records. 1-5 - Yvonne Murray, David A. Anisi:
Survey of Formal Verification Methods for Smart Contracts on Blockchain. 1-6 - Tomoki Chiba, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp. 1-6 - Áine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, Babar Shah:
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches. 1-6 - Ertugrul Dogruluk, António Costa, Joaquim Macedo:
A Detection and Defense Approach for Content Privacy in Named Data Network. 1-5 - Fatimah Alshomrani:
Events and Objects Interaction Recognition using Aerial Videos. 1-4 - Shagufta Henna, Alan Davy, Hasan Ali Khattak, Abid Ali Minhas:
An Internet of Things (IoT)-Based Coverage Monitoring for Mission Critical Regions. 1-5 - Aydin E. Homay, Christos Chrysoulas, Mário de Sousa:
Authentication Layer for IEC 61113-3 Applications. 1-5 - Younes Laaboudi, Alexis Olivereau, Nouha Oualha:
An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks. 1-5 - Amr Elsaadany, Mohamed A. Aboul Hassan:
Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT Systems. 1-6 - Christos Constantinides, Stavros Shiaeles, Bogdan V. Ghita, Nicholas Kolokotronis:
A Novel Online Incremental Learning Intrusion Prevention System. 1-6 - Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Automated Revealing of Organizational Assets Based on Event Correlation. 1-5 - Thomas Mundt, Simeon Wiedenmann, Johannes Goltz, Johann Bauer, Maximilian Jung:
Detecting Intrusive Behaviour of People in a Building through Data Analysis and Anomaly Detection in Home Automation Systems. 1-7 - Radek Fujdiak, Petr Mlynek, Pavel Mrnustik, Maros Barabas, Petr Blazek, Filip Borcik, Jiri Misurec:
Managing the Secure Software Development. 1-4 - Evgeny S. Sagatov, D. A. Shkirdov, Andrei M. Sukhov:
Analysis of Network Threats Based on Data from Server-Traps. 1-5 - David Prechtel, Tobias Groß, Tilo Müller:
Evaluating Spread of 'Gasless Send' in Ethereum Smart Contracts. 1-6 - Oumaima Attia, Ines Khoufi, Anis Laouiti, Cédric Adjih:
An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring Application. 1-5 - Katarzyna Kapusta, Han Qiu, Gérard Memmi:
Secure Data Sharing with Fast Access Revocation through Untrusted Clouds. 1-5 - Michael J. May, Etamar Laron:
Combating Ransomware using Content Analysis and Complex File Events. 1-5 - Wai Weng Lo, Xu Yang, Yapeng Wang:
An Xception Convolutional Neural Network for Malware Classification with Transfer Learning. 1-5 - Daire Homan, Ian Shiel, Christina Thorpe:
A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology. 1-6 - Eyuel Debebe Ayele, Nirvana Meratnia, Paul J. M. Havinga:
An Asynchronous Dual Radio Opportunistic Beacon Network Protocol for Wildlife Monitoring System. 1-7 - Yekta Turk, Engin Zeydan:
Evaluation of FTTx Access Network Migration for IPTV Services. 1-5 - Emilio Jesús Gallego Arias:
Towards Principled Compilation of Ethereum Smart Contracts (SoK). 1-5 - Apostolos P. Fournaris, Spilios Giannoulis, Christos Koulamas:
Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks. 1-5 - Dmitriy N. Moldovyan, Alexander A. Moldovyan, Nicolas Sklavos:
Post-Quantum Signature Schemes for Efficient Hardware Implementation. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.