default search action
ICFNDS 2020: St. Petersburg, Russia
- ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020. ACM 2020, ISBN 978-1-4503-8886-3
- Mostefa Kara, Abdelkader Laouid, Reinhardt Euler, Mohammed Amine Yagoub, Ahcène Bounceur, Mohammad Hammoudeh, Saci Medileh:
A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem. 1:1-1:6 - Sana Sahar Guia, Abdelkader Laouid, Reinhardt Euler, Mohammed Amine Yagoub, Ahcène Bounceur, Mohammad Hammoudeh:
A Salient Object Detection Technique Based on Color Divergence. 2:1-2:6 - Abdukodir Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, Ibrahim A. Elgendy, Ammar Muthanna:
Edge Computing Resource Allocation Orchestration System for Autonomous Vehicles. 3:1-3:7 - Juma Said Ally, Francis Aidan Ruambo:
Enhancing Communication Efficiency in Mobile Networks Using Smartphone-Enabled Edge Computing. 4:1-4:6 - Bassam Al-Shargabi, Simak Abuarqoub:
IoT-Enabled Healthcare: Benefits, Issues and Challenges. 5:1-5:5 - Afaf D. Althobiti, Rabab M. Almohayawi, Omaimah Bamasag:
Machine Learning approach to Secure Software Defined Network: Machine Learning and Artificial Intelligence. 6:1-6:8 - Hmdah Alsolami, Omaimah Bamasag, Asia Othman Aljahdali:
A Novel Access Control Security Model Based on Ciphertext Policy Attribute-Based Encryption for Smart Homes. 7:1-7:5 - Roman Kostromin, Alexander G. Feoktistov:
Agent-Based DevOps of Software and Hardware Resources for Digital Twins of Infrastructural Objects. 8:1-8:6 - Muhammad Abul Hassan, Syed Irfan Ullah, Inam Ullah Khan, Syed Bilal Hussain Shah, Abdus Salam, Arbab Wajid Ullah Khan:
Unmanned Aerial Vehicles Routing Formation Using Fisheye State Routing for Flying Ad-hoc Networks. 9:1-9:7 - Sergey Yu. Melnikov, Konstantin E. Samouylov:
Polygons characterizing the joint statistical properties of the input and output sequences of the binary shift register. 10:1-10:6 - Mashael Khayyat, Raafat Munshi:
SmartGate system: Automating the detection and control of COVID-19. 11:1-11:6 - Igor Zharikov, Varvara Fadeenko, Vadim Davydov, Anton Valov:
Increasing the noise immunity of m-ary radio communication system between motile objects in the microwave range. 12:1-12:3 - Alexander Bobyl, Vadim Davydov, Vladislav Malyshkin:
On The Radon-Nikodym Machine Learning Parallelization. 13:1-13:5 - Andrey V. Krasov, Igor Pestov, Artem M. Gelfand, Aleksey Kazantsev, Anna Polyanicheva:
Using mathematical forecasting methods to estimate the load on the computing power of the IoT network. 14:1-14:6 - Alaa Alsaeedi, Omaimah Bamasag, Asmaa Munshi:
Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing. 15:1-15:5 - Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, Othman Othman:
Improve the Firewall Accuracy By using Dynamic Ontology. 16:1-16:5 - Nikita Shustov, Vasiliy Zelenov, Ruslan Kirichek:
Development of System for Measuring Internet Speed and Network Parameters on Fixed and Mobile Communication Networks Based on Recommendation ITU-T Q.3961 and Recommendation ITU-T Q.3056 Using Probes. 17:1-17:7 - Aleksandr Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, Andrey V. Krasov:
Investigation of operating system security mechanisms for vulnerabilities. 18:1-18:6 - Igor V. Kotenko, Andrey V. Krasov, Igor Ushakov, Konstantin E. Izrailov:
Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model. 19:1-19:8 - Samuel Muhizi, Mahmood Al-Bahri:
Dynamic Flow Classification Model for Resource Distribution in SDN Networks. 20:1-20:5 - Vladimir M. Vishnevsky, Andrey A. Larionov, Maxim Zvyagin, Truong Duy Dinh, Anton Ovchinnikov, Ruslan Kirichek:
Software development for controlling a group of UAVs. 21:1-21:6 - Abdel-Nasser Ateeq, Israa Obaid, Othman Othman, Ahmed Awad:
Lifetime Enhancement of WSN Based on Improved LEACH with Cluster Head Alternative Gateway. 22:1-22:6 - Nikita Podgornov, Roman V. Davydov, Dmitry Zotov, Valery Antonov, Vladimir Maslikov, Elena Maslikova:
Mathematical modelling of the operation of a multistage flood control system using parallel computations. 23:1-23:7 - Vladimir Fomin, Igor Aleksandrov, Denis Gallyamov, Ruslan Kirichek:
Modified Indexing Algorithm based on Priority Queue in Metric Space for MVP Tree. 24:1-24:8 - Arseniy D. Prosvirin, Vadim V. Davydov, Angelina V. Moroz:
Development of multifunctional system for controlling user access to the Internet. 25:1-25:4 - Mikhail V. Buinevich, Konstantin E. Izrailov, Igor V. Kotenko, Igor Ushakov, Dmitry Vlasov:
Approach to combining different methods for detecting insiders. 26:1-26:6 - Inam Ullah Khan, Syeda Zillay Nain Zukhraf, Asrin Abdollahi, Shahbaz Ali Imran, Ijaz Mansoor Qureshi, Muhammad Adnan Aziz, Syed Bilal Hussian Shah:
Reinforce Based Optimization in Wireless Communication Technologies and Routing Techniques Using Internet of Flying Vehicles. 27:1-27:6 - Sergey S. Vladimirov, Ruslan Kirichek, Vladimir M. Vishnevsky:
Network Coding for the Interaction of Unmanned Flying Platforms in Data Acquisition Networks. 28:1-28:7 - Yulia Avakyan, Ekaterina S. Kuznetsova, Ruslan Kirichek:
Methodology for testing LPWAN networks with mesh topology. 29:1-29:6 - Van-Dai Pham, Anton Ovchinnikov, Alina Zadorozhnaya, Ruslan Kirichek, Lyudmila Myrova:
A Hybrid Wireless Mesh Network for Sensor and Actuator Management in Smart Sustainable Cities. 30:1-30:4 - Alexander Dagaev, Yuriy Borodyansky, Albina Pomogalova:
Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching Network. 31:1-31:4 - Atheer Alharthi, Ala Eshmawi, Azzah Kabbas, Lobna Hsairi:
Network Traffic Analysis for DDOS Attack Detection. 32:1-32:6 - Wala'a Al-Ahmadi, Asia Othman Aljahdali, Asmaa Munshi:
An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA Sequence. 33:1-33:5 - Nouf Aljadani, Tahani Gazdar:
A New distributed PKI for WSN-Based Application in Smart Grid. 34:1-34:5 - Taghreed Alghamdi, Samia Snoussi, Lobna Hsairi:
Canny edge detection towards deep learning Arabic document classification. 35:1-35:5 - Ohoud Alboqomi, Tahani Gazdar, Asmaa Munshi:
A New Blockchain-based Trust Management protocol For Vehicular ad hoc networks. 36:1-36:5 - Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani:
An Experimental Study to Understand How Users Choose Password. 37:1-37:5 - Omnia Abdullah Alharbi, Asia Othman Aljahdali, Azizah Abdul Manaf:
A Robust Double Layer Steganography Technique Based on DNA Sequences. 38:1-38:5 - Ilya Grishin, Van-Dai Pham, Darina Okuneva, Ruslan Kirichek, Lyudmila Myrova:
Applying Multidimensional Scaling Method to Determine Spatial Coordinates of WSN Nodes. 39:1-39:5 - Halim Yanikomeroglu:
Wireless Access Architecture: The Next 20+ Years. 40:1 - Andrey Koucheryavy:
Network Decentralization. 41:1 - Mohamed Faten Zhani:
FlexNGIA - Towards the Cloudification of the Internet. 42:1 - Mohammad Hammoudeh:
Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure. 43:1 - Abdelrahman Abuarqoub:
Security Challenges Posed by Quantum Computing on Emerging Technologies. 44:1 - Sergey D. Dvoenko, Denis O. Pshenichny:
Developing the Kemeny's Weighted Median for the Rank Aggregation Problem. 45:1-45:4 - Salvatore Carta, Sergio Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, Diego Reforgiato Recupero:
HawkEye: a Visual Framework for Agile Cross-Validation of Deep Learning Approaches in Financial Forecasting. 46:1-46:6 - Vu-Anh-Quang Nguyen, Jongoh Park, Kyeongjin Joo, Thi Tra Vinh Tran, Trung Tin Tran, Joonhyeon Choi:
Human Face Recognition and Temperature Measurement Based on Deep Learning for Covid-19 Quarantine Checkpoint. 47:1-47:6 - Viet Tran, Mau Pham, Hoang Ho, Luan Nguyen:
Advanced Environmental Monitoring Solution Using the Internet of Things (IoT) and Blockchain. 48:1-48:5 - Trang Uyen Tran, Ha Hoang Thi Thanh, Phuong Hoai Dang, Michel Riveill:
Multitask Aspect_Based Sentiment Analysis with Integrated Bidirectional LSTM & CNN Model. 49:1-49:7 - Huu Tai Phung, Huynh Khanh Ly Dang, Minh Tuan Pham:
Cyberbullying detection based on word curve representations using B-spline interpolation. 50:1-50:7 - Khoi Nguyen-Tan, Tien Tran Ho Thuy:
An integrated data collection and remote monitoring of power transmission grid using Internet of Things (IoT). 51:1-51:5 - Duy Binh Doan, Minh Tuan Pham, Duc Long Dang:
Predicting RNA secondary structure based on machine learning and genetic algorithm. 52:1-52:12 - Hoang Viet Nguyen, Hai Ngoc Nguyen, Tetsutaro Uehara:
Multiple Level Action Embedding for Penetration Testing. 53:1-53:9 - Hai Ngoc Nguyen, Hoang Nguyen Viet, Tetsutaro Uehara:
An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection. 54:1-54:8 - Aleksandr O. Larin, Oleg Seredin, Andrey Kopylov:
Reducing the Impact of Outliers on the One-Class Classification Decision Rule. 55:1-55:5 - Andrei Filin, Inessa Gracheva, Andrey Kopylov:
Haze Removal Method Based on Joint Transmission Map Estimation and Atmospheric-Light Extraction. 56:1-56:6 - Denis Vasiliev, Igor Zharikov, Varvara Fadeenko, Illarion Fadeenko, Vadim Davydov:
Optimization of designs for fiber optic communication line. 57:1-57:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.