default search action
8. NTMS 2016: Larnaca, Cyprus
- Mohamad Badra, Giovanni Pau, Vasos Vassiliou:
8th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2016, Larnaca, Cyprus, November 21-23, 2016. IEEE 2016, ISBN 978-1-5090-2914-3 - Aniruddha Chandra
, Tomas Mikulasek
, Jiri Blumenstein
, Ales Prokes
:
60 GHz mmW Channel Measurements inside a Bus. 1-5 - Elias Bou-Harb
:
A Brief Survey of Security Approaches for Cyber-Physical Systems. 1-5 - Anastas Nikolov, Evelina Pencheva
, Ivaylo Atanasov
, Kamelia Nikolova
:
A Case of Service Interaction in M2M Device Management. 1-5 - Vasileios Karyotis
, Eleni Stai, Symeon Papavassiliou:
A Component-Based Cross-Layer Framework for Software Defined Wireless Networks. 1-6 - Moustafa Ammar, Mohamed R. M. Rizk
, Ayman A. Abdel-Hamid, Ahmed K. Aboul-Seoud:
A Framework for Security Enhancement in SDN-Based Datacenters. 1-4 - Houda Labiod, Alain Servel, Gerard Seggara, Badis Hammi, Jean Philippe Monteuuis:
A New Service Advertisement Message for ETSI ITS Environments: CAM-Infrastructure. 1-4 - José Luis Gomez Ortega
, Liangxiu Han
, Nicholas Bowring:
A Novel Dynamic Hidden Semi-Markov Model (D-HSMM) for Occupancy Pattern Detection from Sensor Data Stream. 1-5 - Akaki Jobava, Anis Yazidi, B. John Oommen
, Kyrre M. Begnum:
Achieving Intelligent Traffic-Aware Consolidation of Virtual Machines in a Data Center Using Learning Automata. 1-5 - Enrico Ferrera, Rosaria Rossini
, Davide Conzon
, Sandro Tassone, Claudio Pastrone
:
Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms. 1-5 - Moreno Ambrosin
, Mauro Conti, Fabio De Gaspari
, Nishanth Devarajan:
Amplified Distributed Denial of Service Attack in Software Defined Networking. 1-4 - Mauricio Iturralde
, Roberto Maldonado, Daniel Fellig:
An Approach to Detecting Text Autorship in the Spanish Language. 1-5 - George Moldovan, Elias Z. Tragos, Alexandros G. Fragkiadakis
, Henrich C. Pöhls, Daniel Calvo:
An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach. 1-5 - Hossein Fereidooni, Mauro Conti, Danfeng Yao
, Alessandro Sperduti:
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications. 1-5 - Jouni Tervonen
, Markku Hartikainen, Marjo Heikkilä
, Marjut Koskela
:
Applying and Comparing Two Measurement Approaches for the Estimation of Indoor WiFi Coverage. 1-4 - Elias Bou-Harb
, Mark Scanlon
, Claude Fachkha:
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections. 1-5 - Nikos Fotiou, Hasan M. A. Islam
, Dmitrij Lagutin, Teemu Hakala, George C. Polyzos
:
CoAP over ICN. 1-4 - Christian Wittke, Zoya Dyka
, Peter Langendörfer
:
Comparison of EM Probes Using SEMA of an ECC Design. 1-5 - Norihiro Sota, Hiroaki Higaki:
Cooperative Watchdog for Malicious Failure Notification in Wireless Ad-Hoc Networks. 1-4 - Christos Bouras, Georgios Diles:
Coordination Strategy for Dense 5G Femtocell Deployments. 1-5 - Salman Saadat
:
Cross Layer Design to Evaluate Scalable Video Traffic in Multihop Cognitive Radio Environment. 1-5 - Nicolas Sklavos
, Ioannis D. Zaharakis:
Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations. 1-2 - Patrick Hosein, Laurielyse Girod-Williams, Cornelius van Rensburg:
Cyclic Beam Switching for Smart Grid Networks. 1-4 - Oliver Hahm, Cédric Adjih, Emmanuel Baccelli, Thomas C. Schmidt
, Matthias Wählisch
:
Designing Time Slotted Channel Hopping and Information - Centric Networking for IoT. 1-5 - Mohammed Imad Aal-Nouman
, Haifa Takruri-Rizk, Martin Hope:
Efficient Communications for Location-Based Services Using Spare Extensions of Control Channels in Mobile Networks. 1-6 - Jun Zhang, Houda Labiod:
Energy Efficient Multi-Layer Femtocell Networks. 1-5 - Kris Shrishak, Zekeriya Erkin
, Remco Schaar:
Enhancing User Privacy in Federated eID Schemes. 1-5 - Charalambos Sergiou
, Vasos Vassiliou
, Aristodemos Paphitis:
Evaluation of a Fluid Dynamic Model in Wireless Sensor Networks for the Estimation of Maximum Traffic Volume. 1-5 - Axel Hunger, Pascal A. Klein, Martin H. Verbunt:
Evaluation of the Redundancy-Bandwidth Trade-Off and Jitter Compensation in rMPTCP. 1-5 - Ioannis D. Zaharakis, Nicolas Sklavos
, Achilles Kameas:
Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education. 1-2 - Mounira Msahli, Ahmed Serhrouchni, Mohamad Badra:
Extending TLS with KMIP Protocol for Cloud Computing. 1-6 - Hocine Ameur, Moez Esseghir, Lyes Khoukhi:
Fully Distributed Approach for Energy Saving in Heterogeneous Networks. 1-6 - Jerzy Martyna:
Green Power Control in Underlaying Cognitive Radio Networks. 1-5 - Rawan Alsheikh
, Nadine Akkari
, Etimad A. Fadel
:
Grid Based Energy-Aware MAC Protocol for Wireless Nanosensor Network. 1-5 - Eyuel Debebe Ayele
, Nirvana Meratnia, Paul J. M. Havinga:
HAMA: A Herd-Movement Adaptive MAC Protocol for Wireless Sensor Networks. 1-7 - Zoya Dyka
, Estuardo Alpirez Bock, Ievgen Kabin
, Peter Langendörfer
:
Inherent Resistance of Efficient ECC Designs against SCA Attacks. 1-5 - Fabien Majéric, Benoit Gonzalvo, Lilian Bossuet:
JTAG Combined Attack - Another Approach for Fault Injection. 1-5 - Lucas Leão, Violeta Felea, Hervé Guyennet:
MAC-Aware Routing in Multi-Sink WSN with Dynamic Back-Off Time and Buffer Constraint. 1-5 - Sultan Al Sharif, Mohamed Al Ali, N. Al Reqabi, Farkhund Iqbal
, Thar Baker
, Andrew Marrington:
Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation. 1-6 - Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:
Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study. 1-5 - Gustavo Gonzalez Granadillo, Mohammed El-Barbori, Hervé Debar
:
New Types of Alert Correlation for Security Information and Event Management Systems. 1-7 - Ons Bouachir
, Adel Ben Mnaouer
, Farid Touati, Damiano Crescini:
Opportunistic Routing and Data Dissemination Protocol for Energy Harvesting Wireless Sensor Networks. 1-5 - Jerzy Martyna:
Optimal Power Allocation in Two-Tier MIMO Cognitive Femtocell Radio Networks. 1-4 - Evangelia Tsiontsiou, Bernardetta Addis
, Ye-Qiong Song
, Alberto Ceselli
:
Optimal Probabilistic Energy-Aware Routing for Duty-Cycled Wireless Sensor Networks. 1-7 - Nicholas Anderson, Robert Mitchell, Ing-Ray Chen:
Parameterizing Moving Target Defenses. 1-6 - Suzan Almutairi, Saoucene Mahfoudh, Jalal S. Alowibdi:
Peer to Peer Botnet Detection Based on Network Traffic Analysis. 1-4 - Pratibha Mitharwal, Christophe Lohr
, Annie Gravey
:
Performance Analysis of NEMO Augmented with MPTCP. 1-5 - Avinash Mungur
, Muhammad Tuhaloo, Muzaffar Jawarun:
Performance Evaluation of a Hybrid Paging Mechanism to Support Locator Identity Split End-Host Mobility. 1-5 - Robert Mitchell, Paul Sery:
Refining the Foundations for Cyber Zone Defense. 1-6 - Vincent Ghiëtte, Norbert Blenn, Christian Doerr:
Remote Identification of Port Scan Toolchains. 1-5 - Abderrazak Hachani
, Imen Barouni, Zeineb Ben Said, Lamis Amamou:
RFID Based Smart Fridge. 1-4 - Charilaos Stais, George Xylomenos
, Evangelos Zafeiratos:
RT-SENMOS: Sink-Driven Congestion and Error Control for Sensor Networks. 1-4 - Ali M. Mahmood
, Adil Al-Yasiri:
Scalable Processing in 5G Cloud-RAN Networks Using MapReduce Framework. 1-6 - Nikos Fotiou, George Xylomenos
, George C. Polyzos:
Securing Information-Centric Networking without Negating Middleboxes. 1-5 - Aymen J. Salman
, Adil Al-Yasiri:
SenNet: A Programming Toolkit to Develop Wireless Sensor Network Applications. 1-7 - Silvia Mirri
, Catia Prandi
, Paola Salomoni, Lorenzo Monti
:
Social Location Awareness: A Prototype of Altruistic IoT. 1-5 - Juha Petäjäjärvi, Konstantin Mikhaylov
, Heikki Karvonen, Risto Vuohtoniemi, Jari H. Iinatti:
Superregenerative Wake-Up Receiver with 20 µW Power Consumption for Human Body Communications. 1-5 - Vasilios A. Siris
, Yannis Thomas, George C. Polyzos
:
Supporting the IoT over Integrated Satellite-Terrestrial Networks Using Information-Centric Networking. 1-5 - Guillaume Brogi, Valérie Viet Triem Tong:
TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking. 1-5 - Mohammad Moein Almasi, Taha R. Siddiqui, Noman Mohammed, Hadi Hemmati:
The Risk-Utility Tradeoff for Data Privacy Models. 1-5 - Pascal Urien
:
Three Innovative Directions Based on Secure Elements for Trusted and Secured IoT Platforms. 1-2 - Nadir Cherifi, Gilles Grimaud, Alexandre Boe
, Thomas Vantroys
:
Toward Energy Profiling of Connected Embedded Systems. 1-4 - Charles Wheelus, Elias Bou-Harb
, Xingquan Zhu
:
Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence. 1-5 - Zeeshan Afzal
, Stefan Lindskog, Anna Brunström, Anders Liden:
Towards Multipath TCP Aware Security Technologies. 1-8 - Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb
, Mark Scanlon
:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. 1-5 - Welderufael B. Tesfay, Jetzabel Serna-Olvera:
Towards User-Centered Privacy Risk Detection and Quantification Framework. 1-5 - Peter Heise, Fabien Geyer, Roman Obermaisser:
TSimNet: An Industrial Time Sensitive Networking Simulation Framework Based on OMNeT++. 1-5 - Sultan Al Sharif, Farkhund Iqbal
, Thar Baker
, A. Khattack:
White-Hat Hacking Framework for Promoting Security Awareness. 1-6 - Rosaria Rossini
, Enrico Ferrera, Davide Conzon
, Claudio Pastrone
:
WSNs Self-Calibration Approach for Smart City Applications Leveraging Incremental Machine Learning Techniques. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.