default search action
8. NTMS 2016: Larnaca, Cyprus
- Mohamad Badra, Giovanni Pau, Vasos Vassiliou:
8th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2016, Larnaca, Cyprus, November 21-23, 2016. IEEE 2016, ISBN 978-1-5090-2914-3 - Aniruddha Chandra, Tomas Mikulasek, Jiri Blumenstein, Ales Prokes:
60 GHz mmW Channel Measurements inside a Bus. 1-5 - Elias Bou-Harb:
A Brief Survey of Security Approaches for Cyber-Physical Systems. 1-5 - Anastas Nikolov, Evelina Pencheva, Ivaylo Atanasov, Kamelia Nikolova:
A Case of Service Interaction in M2M Device Management. 1-5 - Vasileios Karyotis, Eleni Stai, Symeon Papavassiliou:
A Component-Based Cross-Layer Framework for Software Defined Wireless Networks. 1-6 - Moustafa Ammar, Mohamed R. M. Rizk, Ayman A. Abdel-Hamid, Ahmed K. Aboul-Seoud:
A Framework for Security Enhancement in SDN-Based Datacenters. 1-4 - Houda Labiod, Alain Servel, Gerard Seggara, Badis Hammi, Jean Philippe Monteuuis:
A New Service Advertisement Message for ETSI ITS Environments: CAM-Infrastructure. 1-4 - José Luis Gomez Ortega, Liangxiu Han, Nicholas Bowring:
A Novel Dynamic Hidden Semi-Markov Model (D-HSMM) for Occupancy Pattern Detection from Sensor Data Stream. 1-5 - Akaki Jobava, Anis Yazidi, B. John Oommen, Kyrre M. Begnum:
Achieving Intelligent Traffic-Aware Consolidation of Virtual Machines in a Data Center Using Learning Automata. 1-5 - Enrico Ferrera, Rosaria Rossini, Davide Conzon, Sandro Tassone, Claudio Pastrone:
Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms. 1-5 - Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Nishanth Devarajan:
Amplified Distributed Denial of Service Attack in Software Defined Networking. 1-4 - Mauricio Iturralde, Roberto Maldonado, Daniel Fellig:
An Approach to Detecting Text Autorship in the Spanish Language. 1-5 - George Moldovan, Elias Z. Tragos, Alexandros G. Fragkiadakis, Henrich C. Pöhls, Daniel Calvo:
An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach. 1-5 - Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti:
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications. 1-5 - Jouni Tervonen, Markku Hartikainen, Marjo Heikkilä, Marjut Koskela:
Applying and Comparing Two Measurement Approaches for the Estimation of Indoor WiFi Coverage. 1-4 - Elias Bou-Harb, Mark Scanlon, Claude Fachkha:
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections. 1-5 - Nikos Fotiou, Hasan M. A. Islam, Dmitrij Lagutin, Teemu Hakala, George C. Polyzos:
CoAP over ICN. 1-4 - Christian Wittke, Zoya Dyka, Peter Langendörfer:
Comparison of EM Probes Using SEMA of an ECC Design. 1-5 - Norihiro Sota, Hiroaki Higaki:
Cooperative Watchdog for Malicious Failure Notification in Wireless Ad-Hoc Networks. 1-4 - Christos Bouras, Georgios Diles:
Coordination Strategy for Dense 5G Femtocell Deployments. 1-5 - Salman Saadat:
Cross Layer Design to Evaluate Scalable Video Traffic in Multihop Cognitive Radio Environment. 1-5 - Nicolas Sklavos, Ioannis D. Zaharakis:
Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations. 1-2 - Patrick Hosein, Laurielyse Girod-Williams, Cornelius van Rensburg:
Cyclic Beam Switching for Smart Grid Networks. 1-4 - Oliver Hahm, Cédric Adjih, Emmanuel Baccelli, Thomas C. Schmidt, Matthias Wählisch:
Designing Time Slotted Channel Hopping and Information - Centric Networking for IoT. 1-5 - Mohammed Imad Aal-Nouman, Haifa Takruri-Rizk, Martin Hope:
Efficient Communications for Location-Based Services Using Spare Extensions of Control Channels in Mobile Networks. 1-6 - Jun Zhang, Houda Labiod:
Energy Efficient Multi-Layer Femtocell Networks. 1-5 - Kris Shrishak, Zekeriya Erkin, Remco Schaar:
Enhancing User Privacy in Federated eID Schemes. 1-5 - Charalambos Sergiou, Vasos Vassiliou, Aristodemos Paphitis:
Evaluation of a Fluid Dynamic Model in Wireless Sensor Networks for the Estimation of Maximum Traffic Volume. 1-5 - Axel Hunger, Pascal A. Klein, Martin H. Verbunt:
Evaluation of the Redundancy-Bandwidth Trade-Off and Jitter Compensation in rMPTCP. 1-5 - Ioannis D. Zaharakis, Nicolas Sklavos, Achilles Kameas:
Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education. 1-2 - Mounira Msahli, Ahmed Serhrouchni, Mohamad Badra:
Extending TLS with KMIP Protocol for Cloud Computing. 1-6 - Hocine Ameur, Moez Esseghir, Lyes Khoukhi:
Fully Distributed Approach for Energy Saving in Heterogeneous Networks. 1-6 - Jerzy Martyna:
Green Power Control in Underlaying Cognitive Radio Networks. 1-5 - Rawan Alsheikh, Nadine Akkari, Etimad A. Fadel:
Grid Based Energy-Aware MAC Protocol for Wireless Nanosensor Network. 1-5 - Eyuel Debebe Ayele, Nirvana Meratnia, Paul J. M. Havinga:
HAMA: A Herd-Movement Adaptive MAC Protocol for Wireless Sensor Networks. 1-7 - Zoya Dyka, Estuardo Alpirez Bock, Ievgen Kabin, Peter Langendörfer:
Inherent Resistance of Efficient ECC Designs against SCA Attacks. 1-5 - Fabien Majéric, Benoit Gonzalvo, Lilian Bossuet:
JTAG Combined Attack - Another Approach for Fault Injection. 1-5 - Lucas Leão, Violeta Felea, Hervé Guyennet:
MAC-Aware Routing in Multi-Sink WSN with Dynamic Back-Off Time and Buffer Constraint. 1-5 - Sultan Al Sharif, Mohamed Al Ali, N. Al Reqabi, Farkhund Iqbal, Thar Baker, Andrew Marrington:
Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation. 1-6 - Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study. 1-5 - Gustavo Gonzalez Granadillo, Mohammed El-Barbori, Hervé Debar:
New Types of Alert Correlation for Security Information and Event Management Systems. 1-7 - Ons Bouachir, Adel Ben Mnaouer, Farid Touati, Damiano Crescini:
Opportunistic Routing and Data Dissemination Protocol for Energy Harvesting Wireless Sensor Networks. 1-5 - Jerzy Martyna:
Optimal Power Allocation in Two-Tier MIMO Cognitive Femtocell Radio Networks. 1-4 - Evangelia Tsiontsiou, Bernardetta Addis, Ye-Qiong Song, Alberto Ceselli:
Optimal Probabilistic Energy-Aware Routing for Duty-Cycled Wireless Sensor Networks. 1-7 - Nicholas Anderson, Robert Mitchell, Ing-Ray Chen:
Parameterizing Moving Target Defenses. 1-6 - Suzan Almutairi, Saoucene Mahfoudh, Jalal S. Alowibdi:
Peer to Peer Botnet Detection Based on Network Traffic Analysis. 1-4 - Pratibha Mitharwal, Christophe Lohr, Annie Gravey:
Performance Analysis of NEMO Augmented with MPTCP. 1-5 - Avinash Mungur, Muhammad Tuhaloo, Muzaffar Jawarun:
Performance Evaluation of a Hybrid Paging Mechanism to Support Locator Identity Split End-Host Mobility. 1-5 - Robert Mitchell, Paul Sery:
Refining the Foundations for Cyber Zone Defense. 1-6 - Vincent Ghiëtte, Norbert Blenn, Christian Doerr:
Remote Identification of Port Scan Toolchains. 1-5 - Abderrazak Hachani, Imen Barouni, Zeineb Ben Said, Lamis Amamou:
RFID Based Smart Fridge. 1-4 - Charilaos Stais, George Xylomenos, Evangelos Zafeiratos:
RT-SENMOS: Sink-Driven Congestion and Error Control for Sensor Networks. 1-4 - Ali M. Mahmood, Adil Al-Yasiri:
Scalable Processing in 5G Cloud-RAN Networks Using MapReduce Framework. 1-6 - Nikos Fotiou, George Xylomenos, George C. Polyzos:
Securing Information-Centric Networking without Negating Middleboxes. 1-5 - Aymen J. Salman, Adil Al-Yasiri:
SenNet: A Programming Toolkit to Develop Wireless Sensor Network Applications. 1-7 - Silvia Mirri, Catia Prandi, Paola Salomoni, Lorenzo Monti:
Social Location Awareness: A Prototype of Altruistic IoT. 1-5 - Juha Petäjäjärvi, Konstantin Mikhaylov, Heikki Karvonen, Risto Vuohtoniemi, Jari H. Iinatti:
Superregenerative Wake-Up Receiver with 20 µW Power Consumption for Human Body Communications. 1-5 - Vasilios A. Siris, Yannis Thomas, George C. Polyzos:
Supporting the IoT over Integrated Satellite-Terrestrial Networks Using Information-Centric Networking. 1-5 - Guillaume Brogi, Valérie Viet Triem Tong:
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking. 1-5 - Mohammad Moein Almasi, Taha R. Siddiqui, Noman Mohammed, Hadi Hemmati:
The Risk-Utility Tradeoff for Data Privacy Models. 1-5 - Pascal Urien:
Three Innovative Directions Based on Secure Elements for Trusted and Secured IoT Platforms. 1-2 - Nadir Cherifi, Gilles Grimaud, Alexandre Boe, Thomas Vantroys:
Toward Energy Profiling of Connected Embedded Systems. 1-4 - Charles Wheelus, Elias Bou-Harb, Xingquan Zhu:
Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence. 1-5 - Zeeshan Afzal, Stefan Lindskog, Anna Brunström, Anders Liden:
Towards Multipath TCP Aware Security Technologies. 1-8 - Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. 1-5 - Welderufael B. Tesfay, Jetzabel Serna-Olvera:
Towards User-Centered Privacy Risk Detection and Quantification Framework. 1-5 - Peter Heise, Fabien Geyer, Roman Obermaisser:
TSimNet: An Industrial Time Sensitive Networking Simulation Framework Based on OMNeT++. 1-5 - Sultan Al Sharif, Farkhund Iqbal, Thar Baker, A. Khattack:
White-Hat Hacking Framework for Promoting Security Awareness. 1-6 - Rosaria Rossini, Enrico Ferrera, Davide Conzon, Claudio Pastrone:
WSNs Self-Calibration Approach for Smart City Applications Leveraging Incremental Machine Learning Techniques. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.