


default search action
8. NTMS 2016: Larnaca, Cyprus
- Mohamad Badra, Giovanni Pau, Vasos Vassiliou:

8th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2016, Larnaca, Cyprus, November 21-23, 2016. IEEE 2016, ISBN 978-1-5090-2914-3 - Aniruddha Chandra

, Tomas Mikulasek
, Jiri Blumenstein
, Ales Prokes
:
60 GHz mmW Channel Measurements inside a Bus. 1-5 - Elias Bou-Harb

:
A Brief Survey of Security Approaches for Cyber-Physical Systems. 1-5 - Anastas Nikolov, Evelina Pencheva

, Ivaylo Atanasov
, Kamelia Nikolova
:
A Case of Service Interaction in M2M Device Management. 1-5 - Vasileios Karyotis

, Eleni Stai, Symeon Papavassiliou:
A Component-Based Cross-Layer Framework for Software Defined Wireless Networks. 1-6 - Moustafa Ammar, Mohamed R. M. Rizk

, Ayman A. Abdel-Hamid, Ahmed K. Aboul-Seoud:
A Framework for Security Enhancement in SDN-Based Datacenters. 1-4 - Houda Labiod, Alain Servel, Gerard Seggara, Badis Hammi, Jean Philippe Monteuuis:

A New Service Advertisement Message for ETSI ITS Environments: CAM-Infrastructure. 1-4 - José Luis Gomez Ortega

, Liangxiu Han
, Nicholas Bowring:
A Novel Dynamic Hidden Semi-Markov Model (D-HSMM) for Occupancy Pattern Detection from Sensor Data Stream. 1-5 - Akaki Jobava, Anis Yazidi, B. John Oommen

, Kyrre M. Begnum:
Achieving Intelligent Traffic-Aware Consolidation of Virtual Machines in a Data Center Using Learning Automata. 1-5 - Enrico Ferrera, Rosaria Rossini

, Davide Conzon
, Sandro Tassone, Claudio Pastrone
:
Adaptive Security Framework for Resource-Constrained Internet-of-Things Platforms. 1-5 - Moreno Ambrosin

, Mauro Conti, Fabio De Gaspari
, Nishanth Devarajan:
Amplified Distributed Denial of Service Attack in Software Defined Networking. 1-4 - Mauricio Iturralde

, Roberto Maldonado, Daniel Fellig:
An Approach to Detecting Text Autorship in the Spanish Language. 1-5 - George Moldovan, Elias Z. Tragos, Alexandros G. Fragkiadakis

, Henrich C. Pöhls, Daniel Calvo:
An IoT Middleware for Enhanced Security and Privacy: The RERUM Approach. 1-5 - Hossein Fereidooni, Mauro Conti, Danfeng Yao

, Alessandro Sperduti:
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications. 1-5 - Jouni Tervonen

, Markku Hartikainen, Marjo Heikkilä
, Marjut Koskela
:
Applying and Comparing Two Measurement Approaches for the Estimation of Indoor WiFi Coverage. 1-4 - Elias Bou-Harb

, Mark Scanlon
, Claude Fachkha:
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections. 1-5 - Nikos Fotiou, Hasan M. A. Islam

, Dmitrij Lagutin, Teemu Hakala, George C. Polyzos
:
CoAP over ICN. 1-4 - Christian Wittke, Zoya Dyka

, Peter Langendörfer
:
Comparison of EM Probes Using SEMA of an ECC Design. 1-5 - Norihiro Sota, Hiroaki Higaki:

Cooperative Watchdog for Malicious Failure Notification in Wireless Ad-Hoc Networks. 1-4 - Christos Bouras, Georgios Diles:

Coordination Strategy for Dense 5G Femtocell Deployments. 1-5 - Salman Saadat

:
Cross Layer Design to Evaluate Scalable Video Traffic in Multihop Cognitive Radio Environment. 1-5 - Nicolas Sklavos

, Ioannis D. Zaharakis
:
Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations. 1-2 - Patrick Hosein, Laurielyse Girod-Williams, Cornelius van Rensburg:

Cyclic Beam Switching for Smart Grid Networks. 1-4 - Oliver Hahm, Cédric Adjih, Emmanuel Baccelli, Thomas C. Schmidt

, Matthias Wählisch
:
Designing Time Slotted Channel Hopping and Information - Centric Networking for IoT. 1-5 - Mohammed Imad Aal-Nouman

, Haifa Takruri-Rizk, Martin Hope:
Efficient Communications for Location-Based Services Using Spare Extensions of Control Channels in Mobile Networks. 1-6 - Jun Zhang, Houda Labiod:

Energy Efficient Multi-Layer Femtocell Networks. 1-5 - Kris Shrishak, Zekeriya Erkin

, Remco Schaar:
Enhancing User Privacy in Federated eID Schemes. 1-5 - Charalambos Sergiou

, Vasos Vassiliou
, Aristodemos Paphitis:
Evaluation of a Fluid Dynamic Model in Wireless Sensor Networks for the Estimation of Maximum Traffic Volume. 1-5 - Axel Hunger, Pascal A. Klein, Martin H. Verbunt:

Evaluation of the Redundancy-Bandwidth Trade-Off and Jitter Compensation in rMPTCP. 1-5 - Ioannis D. Zaharakis

, Nicolas Sklavos
, Achilles Kameas:
Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science Education. 1-2 - Mounira Msahli, Ahmed Serhrouchni, Mohamad Badra:

Extending TLS with KMIP Protocol for Cloud Computing. 1-6 - Hocine Ameur, Moez Esseghir, Lyes Khoukhi:

Fully Distributed Approach for Energy Saving in Heterogeneous Networks. 1-6 - Jerzy Martyna:

Green Power Control in Underlaying Cognitive Radio Networks. 1-5 - Rawan Alsheikh

, Nadine Akkari
, Etimad A. Fadel
:
Grid Based Energy-Aware MAC Protocol for Wireless Nanosensor Network. 1-5 - Eyuel Debebe Ayele

, Nirvana Meratnia, Paul J. M. Havinga:
HAMA: A Herd-Movement Adaptive MAC Protocol for Wireless Sensor Networks. 1-7 - Zoya Dyka

, Estuardo Alpirez Bock, Ievgen Kabin
, Peter Langendörfer
:
Inherent Resistance of Efficient ECC Designs against SCA Attacks. 1-5 - Fabien Majéric, Benoit Gonzalvo, Lilian Bossuet:

JTAG Combined Attack - Another Approach for Fault Injection. 1-5 - Lucas Leão, Violeta Felea, Hervé Guyennet:

MAC-Aware Routing in Multi-Sink WSN with Dynamic Back-Off Time and Buffer Constraint. 1-5 - Sultan Al Sharif, Mohamed Al Ali, N. Al Reqabi, Farkhund Iqbal

, Thar Baker
, Andrew Marrington
:
Magec: An Image Searching Tool for Detecting Forged Images in Forensic Investigation. 1-6 - Giulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor:

Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case Study. 1-5 - Gustavo Gonzalez Granadillo, Mohammed El-Barbori, Hervé Debar

:
New Types of Alert Correlation for Security Information and Event Management Systems. 1-7 - Ons Bouachir

, Adel Ben Mnaouer
, Farid Touati, Damiano Crescini:
Opportunistic Routing and Data Dissemination Protocol for Energy Harvesting Wireless Sensor Networks. 1-5 - Jerzy Martyna:

Optimal Power Allocation in Two-Tier MIMO Cognitive Femtocell Radio Networks. 1-4 - Evangelia Tsiontsiou, Bernardetta Addis

, Ye-Qiong Song
, Alberto Ceselli
:
Optimal Probabilistic Energy-Aware Routing for Duty-Cycled Wireless Sensor Networks. 1-7 - Nicholas Anderson, Robert Mitchell, Ing-Ray Chen:

Parameterizing Moving Target Defenses. 1-6 - Suzan Almutairi, Saoucene Mahfoudh, Jalal S. Alowibdi:

Peer to Peer Botnet Detection Based on Network Traffic Analysis. 1-4 - Pratibha Mitharwal, Christophe Lohr

, Annie Gravey
:
Performance Analysis of NEMO Augmented with MPTCP. 1-5 - Avinash Mungur

, Muhammad Tuhaloo, Muzaffar Jawarun:
Performance Evaluation of a Hybrid Paging Mechanism to Support Locator Identity Split End-Host Mobility. 1-5 - Robert Mitchell, Paul Sery:

Refining the Foundations for Cyber Zone Defense. 1-6 - Vincent Ghiëtte, Norbert Blenn, Christian Doerr:

Remote Identification of Port Scan Toolchains. 1-5 - Abderrazak Hachani

, Imen Barouni, Zeineb Ben Said, Lamis Amamou:
RFID Based Smart Fridge. 1-4 - Charilaos Stais, George Xylomenos

, Evangelos Zafeiratos:
RT-SENMOS: Sink-Driven Congestion and Error Control for Sensor Networks. 1-4 - Ali M. Mahmood

, Adil Al-Yasiri:
Scalable Processing in 5G Cloud-RAN Networks Using MapReduce Framework. 1-6 - Nikos Fotiou, George Xylomenos

, George C. Polyzos:
Securing Information-Centric Networking without Negating Middleboxes. 1-5 - Aymen J. Salman

, Adil Al-Yasiri:
SenNet: A Programming Toolkit to Develop Wireless Sensor Network Applications. 1-7 - Silvia Mirri

, Catia Prandi
, Paola Salomoni, Lorenzo Monti
:
Social Location Awareness: A Prototype of Altruistic IoT. 1-5 - Juha Petäjäjärvi, Konstantin Mikhaylov

, Heikki Karvonen, Risto Vuohtoniemi, Jari H. Iinatti:
Superregenerative Wake-Up Receiver with 20 µW Power Consumption for Human Body Communications. 1-5 - Vasilios A. Siris

, Yannis Thomas, George C. Polyzos
:
Supporting the IoT over Integrated Satellite-Terrestrial Networks Using Information-Centric Networking. 1-5 - Guillaume Brogi, Valérie Viet Triem Tong:

TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow Tracking. 1-5 - Mohammad Moein Almasi, Taha R. Siddiqui, Noman Mohammed, Hadi Hemmati:

The Risk-Utility Tradeoff for Data Privacy Models. 1-5 - Pascal Urien

:
Three Innovative Directions Based on Secure Elements for Trusted and Secured IoT Platforms. 1-2 - Nadir Cherifi, Gilles Grimaud, Alexandre Boe

, Thomas Vantroys
:
Toward Energy Profiling of Connected Embedded Systems. 1-4 - Charles Wheelus, Elias Bou-Harb

, Xingquan Zhu
:
Towards a Big Data Architecture for Facilitating Cyber Threat Intelligence. 1-5 - Zeeshan Afzal

, Stefan Lindskog, Anna Brunström, Anders Liden:
Towards Multipath TCP Aware Security Technologies. 1-8 - Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb

, Mark Scanlon
:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. 1-5 - Welderufael B. Tesfay, Jetzabel Serna-Olvera:

Towards User-Centered Privacy Risk Detection and Quantification Framework. 1-5 - Peter Heise, Fabien Geyer, Roman Obermaisser:

TSimNet: An Industrial Time Sensitive Networking Simulation Framework Based on OMNeT++. 1-5 - Sultan Al Sharif, Farkhund Iqbal

, Thar Baker
, A. Khattack:
White-Hat Hacking Framework for Promoting Security Awareness. 1-6 - Rosaria Rossini

, Enrico Ferrera, Davide Conzon
, Claudio Pastrone
:
WSNs Self-Calibration Approach for Smart City Applications Leveraging Incremental Machine Learning Techniques. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














