


default search action
ICFNDS 2019: Paris, France
- Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, ICFNDS 2019, Paris, France, July 01-02, 2019. ACM 2019, ISBN 978-1-4503-7163-6 
- Muath AlShaikh  , Lamri Laouamer, Abdelkader Laouid , Lamri Laouamer, Abdelkader Laouid , Ahcène Bounceur, Mohammad Hammoudeh , Ahcène Bounceur, Mohammad Hammoudeh : :
 Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm. 1:1-1:6
- Oana-Mihaela Ungureanu, Calin Vladeanu  , Robert E. Kooij: , Robert E. Kooij:
 Kubernetes cluster optimization using hybrid shared-state scheduling framework. 2:1-2:12
- Robert Marsh, Sana Belguith  , Tooska Dargahi , Tooska Dargahi : :
 IoT Database Forensics: An Investigation on HarperDB Security. 3:1-3:7
- Feriel Khanouche, Lydia Maouche, Foudil Mir  , Mohamed Essaid Khanouche , Mohamed Essaid Khanouche : :
 Energy efficient Multi-hops Routing protocol based on Clusters Reorganization for wireless sensor networks. 4:1-4:10
- Brandon Thurgood, Ruth G. Lennon  : :
 Cloud Computing With Kubernetes Cluster Elastic Scaling. 5:1-5:7
- Madalin-Dorin Pop  , Octavian Prostean , Octavian Prostean , Gabriela Prostean: , Gabriela Prostean:
 Multiple Lane Road Car-Following Model using Bayesian Reasoning for Lane Change Behavior Estimation: A Smart Approach for Smart Mobility. 6:1-6:8
- Mouhamed Amine Ouamri  , Mohamed Azni , Mohamed Azni : :
 Overshooting and Cost Minimization in LTE Cellular Network Using Non-dominate Sorting Genetic Algorithm based on Laplace Crossover. 7:1-7:6
- Badreddine Miles, Salim Chikhi, El-Bay Bourennane: 
 Carbon monoxide detection: an IoT application used as a tool for civil protection services to save lives. 8:1-8:4
- Ramzi Mosbah, Larbi Guezouli  , Lyamine Guezouli , Lyamine Guezouli : :
 Road obstacle detection. 9:1-9:5
- Mohammed Zubair, Devrim Unal  , Abdulla K. Al-Ali, Abdullatif Shikfa , Abdulla K. Al-Ali, Abdullatif Shikfa : :
 Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. 10:1-10:7
- Pedro F. Moraes, Joberto S. B. Martins  : :
 A Pub/Sub SDN-Integrated Framework for IoT Traffic Orchestration. 11:1-11:9
- Syeda Sana e Zainab  , M. Tahar Kechadi , M. Tahar Kechadi : :
 Sensitive and Private Data Analysis: A Systematic Review. 12:1-12:11
- Mohammad Alkhawatrah  , Yu Gong, Omar Aldabbas, Mohammad Hammoudeh , Yu Gong, Omar Aldabbas, Mohammad Hammoudeh : :
 Buffer-Aided 5G Cooperative Networks: Considering the Source Delay. 13:1-13:6
- Musa Abubakar Muhammad, Aladdin Ayesh  , Isabel Wagner , Isabel Wagner : :
 Behavior-Based Outlier Detection for Network Access Control Systems. 14:1-14:6
- Maik Benndorf, Martin Gaedke  , Thomas Haenselmann: , Thomas Haenselmann:
 Towards gait analysis - Creating a setup for the analyses under laboratory conditions. 15:1-15:5
- Raghad Jawabreh, Narmeen Darawshe, Othman Othman, Ahmed Awad: 
 FogNetwork Orchestration for Heterogeneous Networks. 16:1-16:2
- Ahmad Lhwani, Abed-Alrhman Mosallam, Aws Alawneh, Ahmed Awad, Othman Othman: 
 A Low Power Boundary Nodes Detection Algorithm for Wireless Sensor Networks (WSNs). 17:1-17:8
- Jesus Pacheco  , Victor H. Benitez, Luis Félix: , Victor H. Benitez, Luis Félix:
 Anomaly Behavior Analysis for IoT Network Nodes. 18:1-18:6
- Mohamed Mohammedi, Mawloud Omar, Yacine Challal  , Abdelmadjid Bouabdallah: , Abdelmadjid Bouabdallah:
 Cryptanalysis and Improvement of Identity-Based Multisignature Scheme. 19:1-19:5
- Khaled Bedjou, Faiçal Azouaou, Abdelouhab Aloui: 
 Detection of terrorist threats on Twitter using SVM. 20:1-20:5
- Mohammed Amine Yagoub, Abdelkader Laouid  , Ahcène Bounceur, Muath AlShaikh , Ahcène Bounceur, Muath AlShaikh : :
 An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms. 21:1-21:7
- Nabil Kadjouh, Ahcène Bounceur, Abdelkamel Tari, Reinhardt Euler, Loïc Lagadec  , Abdelkader Laouid: , Abdelkader Laouid:
 Temperature-based models of batteries for the simulation of Wireless Sensor Networks. 22:1-22:6
- Nabil Kadjouh, Ahcène Bounceur, Abdelkamel Tari, Loïc Lagadec  , Reinhardt Euler, Madani Bezoui , Reinhardt Euler, Madani Bezoui : :
 A New Leader Election Algorithm based on the WBS Algorithm Dedicated to Smart-cities. 23:1-23:5
- Hien Tran, Tarek Menouer  , Patrice Darmon, Abdoulaye Doucoure, François Binder: , Patrice Darmon, Abdoulaye Doucoure, François Binder:
 Smart Contracts Search Engine in Blockchain. 24:1-24:5
- Abdullah Soliman Alshra'a  , Jochen Seitz: , Jochen Seitz:
 External Device to Protect the Software-Defined Network Performance in Case of a Malicious Attack. 25:1-25:6
- Mohamed Essaid Khanouche  , Sihem Mouloudj, Melissa Hammoum: , Sihem Mouloudj, Melissa Hammoum:
 Two-steps QoS-aware services composition algorithm for Internet of Things. 26:1-26:6
- Mohammad Hammoudeh  , Ibrahim Ghafir, Ahcène Bounceur, Thomas Rawlinson: , Ibrahim Ghafir, Ahcène Bounceur, Thomas Rawlinson:
 Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain. 27:1-27:5
- Mohamed Amine Khelif, Jordane Lorandel, Olivier Romain, Matthieu Regnery, Denis Baheux: 
 A Versatile Emulator of MitM for the identification of vulnerabilities of IoT devices, a case of study: smartphones. 28:1-28:6
- Abdelrahman Abuarqoub: 
 A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing. 29:1-29:7
- Karim Akilal, Mawloud Omar, Hachem Slimani  : :
 A wider picture of trust: confronting multi-contextual social traits for trust inference. 30:1-30:5
- Congduc Pham, Ahcène Bounceur, Laurent Clavier, Umber Noreen, Muhammad Ehsan: 
 Investigating and Experimenting Interference Mitigation by Capture Effect in LoRa Networks. 31:1-31:6
- Georgios L. Stavrinides, Helen D. Karatza  : :
 Scheduling Single-Task Jobs along with Bag-of-Task-Chains in Distributed Systems. 32:1-32:6
- Amjad Rattrout  , Ateeq Ateeq: , Ateeq Ateeq:
 Sentiment Analysis on Arabic Content in Social Media: Hybrid Model of Dictionary Based and Fuzzy Logic. 33:1-33:11
- Sahar Ajmal, Muteeb Bin Muzammil, Abid Jamil, Syed Manzar Abbas, Umer Iqbal, Pariwish Touseef: 
 Survey on Cache Schemes in Heterogeneous Networks using 5G Internet of Things. 34:1-34:8
- Moneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib: 
 Understanding Blockchain: Platforms, Applications and Implementation Challenges. 35:1-35:8
- Pariwish Touseef, Khubaib Amjad Alam  , Abid Jamil, Hamza Tauseef, Sahar Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa: , Abid Jamil, Hamza Tauseef, Sahar Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa:
 Analysis of Automated Web Application Security Vulnerabilities Testing. 36:1-36:8
- Sumaira Mustafa, Khubaib Amjad Alam  , Bilal Khan, Muhammad Habib Ullah, Pariwish Touseef: , Bilal Khan, Muhammad Habib Ullah, Pariwish Touseef:
 Fair Coexistence of LTE and WiFi-802.11 in Unlicensed Spectrum: A Systematic Literature Review. 37:1-37:10
- Bisma Rehman, Khubaib Amjad Alam  , Mubashar Rehman, Abid Jamil, Pariwish Touseef, Rimsha Asif: , Mubashar Rehman, Abid Jamil, Pariwish Touseef, Rimsha Asif:
 Combinatorial Testing of Web Services: A Systematic Mapping. 38:1-38:7
- Rimsha Asif, Khubaib Amjad Alam  , Abid Jamil, Pariwish Touseef, Bisma Rehman: , Abid Jamil, Pariwish Touseef, Bisma Rehman:
 WorkFlow Application Scheduling in Cloud Computing: A Systematic Literature Review (SLR). 39:1-39:7
- Muhammad Noman Javed, Hammad Shafiq, Khubaib Amjad Alam  , Abid Jamil, Muhammad Umar Sattar: , Abid Jamil, Muhammad Umar Sattar:
 VANET's Security Concerns and Solutions: A Systematic Literature Review. 40:1-40:12
- Muhammad Rehman Shahid, Sheraz Mehmood, Sana Hafeez, Bilal Zahid, Sohail Jabbar  , Rehan Ashraf: , Rehan Ashraf:
 Blockchain Based Share Economy Trust Point: Case Study Based Validation. 41:1-41:5
- Ahmad Bilal  , Majid Hussain: , Majid Hussain:
 LRAP: A Learned Reflex Action Embedded Associative Context Learning based Processing Efficient Paradigm in Visual Sensor Networks. 42:1-42:9
- Muhammad Arslan Sarwar, Majid Hussain, Muhammad Usman Anwar, Mudassar Ahmad: 
 FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. 43:1-43:9
- Samreen Arshad, Qamar Raza, Majid Hussain: 
 VANETs Embedded Novel Traffic Management Paradigm for Smart City Milieu. 44:1-44:10
- Anum Ghaffar, Majid Hussain: 
 BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through Application. 45:1-45:11
- Hafiz Shakir Mehmood, Rana Zeeshan Ahmad, Muhammad Jehanzaib Yousuf: 
 A Comprehensive Review of Adaptive Noise Cancellation Techniques in the Internet of Things. 46:1-46:8
- Muhammad Akhtar, Majid Hussain, Jehangir Arshad  , Mudassar Ahmad: , Mudassar Ahmad:
 User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT. 47:1-47:8
- Muhammad Yousaf, Naeem Abbas, Farooq Ali, Muhammad Munwar Iqbal, Yasar Amin, Adeel Akram: 
 Miniaturized High Gain Antenna for Biomedical Application. 48:1-48:7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














