


default search action
SmartNets 2024: Harrisonburg, VA, USA
- International Conference on Smart Applications, Communications and Networking, SmartNets 2024, Harrisonburg, VA, USA, May 28-30, 2024. IEEE 2024, ISBN 979-8-3503-8532-8

- Alma Oracevic

, Ahmad Salman
:
Unmanned Aerial Vehicles in Peril: Investigating and Addressing Cyber Threats to UAVs. 1-7 - Ramesh Deshpande

, B. Rama Sanjeeva Reddy, Jayshree Das, B. Naresh Kumar
, Sanjay Dubey, Srinivas Guthi
:
Design and Simulation of Microstrip Patch Antenna with Defected Ground Structure for Satellite Application in Ku Band. 1-4 - Georgios Samaras, Marinela Mertiri, Maria-Evgenia Xezonaki, Nikolaos Psaromanolakis, Vasileios Theodorou, Theodoros Bozios:

Unlocking the Path Towards Automation of Tiny Machine Learning for Edge Computing. 1-6 - Ndala Yves Mulongo:

Industry 5.0 a Novel Technological Concept. 1-6 - Marius Iulian Mihailescu, Stefania Loredana Nita, Valentina Marascu

:
CRANE: A Genuine Framework based on Verifiable Searchable Encryption Security and Resource Constraints Balancing on Client Side. 1-6 - Lizbeth He, Xiang Sun:

IoT-Based Automated Farmland Contamination Monitoring Systems. 1-6 - Oduwunmi Odukoya:

The Transformative Impact of Cloud Computing on Small and Medium-sized Enterprises (SMEs): A Comprehensive Analysis. 1-5 - Shijon Das, Mostafa M. Fouda

, Mohammad G. Abdo:
Short-Term Load Forecasting Using GRU-LGBM Fusion. 1-6 - Hai Dinh-Tuan, Franz Florian Six:

Optimizing Cloud-Native Services with SAGA: A Service Affinity Graph-Based Approach. 1-6 - Sumesh J. Philip, Fnu Amisha, Fnu Kamesh:

Access Control Attacks Against IoT Smart Devices: A Case Study. 1-7 - Asif Rasheed

, Zubair Md Fadlullah, Mostafa M. Fouda
:
Optimizing Feature Panels for Effective Model Training Toward Early Diagnosis of Alzheimer's Disease. 1-6 - Harshith Vaitla, Gad Gad, Zubair Md Fadlullah, Mostafa M. Fouda

:
Combating Malware Traffic in Emerging Networks: A Collaborative Learning Approach. 1-6 - Asanga Udugama, Sneha Kulkarni, Thenuka Karunathilake, Anna Förster

:
Reflexive Forwarding: Way Forward for Communications in an Information-centric IoT? 1-8 - Ali Hamzah Abbas, Yousif Samer Mudhafar

, Akram Talib Kareem, Waleed Abed Abohana:
Quantum Broadcast By Entanglement Swapping. 1-5 - Konrad Horbach, Mathias Kretschmer

:
A Random Early Detection Approach for Capacity Policing in Wireless Backhaul Networks. 1-4 - Alzahraa Alsenani, Cady Alsuhibani, Yousra Almathami, Leen Aldekhayyel, Fatoon Alshaiddi:

MedCore: Intelligent Diagnostics for an Integrated Healthcare Experience. 1-7 - Wallace C. Potts, Christopher Carver:

Best Practices Implementing AIOps in Large Organizations. 1-5 - Tanzim Mostafa

, Mostafa M. Fouda
, Mohammad G. Abdo:
Short-Term Load Forecasting Employing Recurrent Neural Networks. 1-6 - Ahmed F. Ashour

, Mostafa M. Fouda
, Zubair Md Fadlullah, Mohamed I. Ibrahem
:
Enhancing Diabetes Prediction Based on Pair-Wise Ensemble Learning Model Selection. 1-6 - Kavya Agarwal, Ritesh Lalwani, U. Abeena, Kurian Polachan:

VLC-LE: Energy-Efficient and Secure Visible Light Communication for the Internet of Bodies. 1-6 - Jihene Rezgui, Félix Jobin, Younes Kechout, Chritine Turgeon, Foutse Khomh:

Towards a Reliable French Speech Recognition Tool for an Automated Diagnosis of Learning Disabilities. 1-6 - Kshitij Saxena

:
A Feasible Railyard Automation Solution for Freight Railroad operators. 1-6 - Mariam Mussbah, Stefan Schwarz, Markus Rupp:

Graph-Based Access Point Switch On/Off Schemes for Energy-Efficient Cell-Free MIMO. 1-6 - Anam Rajper, Norlina Binti Paraman, Muhammad Nadzir Marsono, Noor Jahan Rajper:

iCuSMAT-DT: A Two-Tier Detection Mechanism for High-Rate DDoS Attacks and Discriminating Benign Flash Traffic in Software-Defined Networks. 1-8 - Mahamat Ismael Hassan, Daouda Ahmat, Samuel Ouya:

Technologies Behind the Humanitarian Demining: A Review. 1-7 - Hamidreza Asefi-Ghamari, Murtadha D. Hssayeni, Imad Mahgoub:

Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security. 1-7 - Kürsat Çakal, Suat Özdemir:

Transforming Military Security: Quantum Age Blockchain Architecture for IoBT - PARS. 1-6 - Yunhwan Jeong, Junghyun Lim, Geunkyung Choi, Byeong-Hee Roh:

Deep Deterministic Policy Gradient-Based Load Balancing Method in SDN Environments. 1-6 - Puya Ghazizadeh, Pushpa Choudhury, Brandon Singh, Alireza Ebrahimi:

Assessing Cooperative Trust-Based Authentication within Micro Vehicular Clouds. 1-6 - Andre Slonopas, Adam Beatty, Yenni Djajalaksana:

Applying Reservoir Computing and Machine Learning Techniques for Image Enhancement in Biomedical Imaging. 1-7 - Ndala Yves Mulongo:

Application of Machine Learning In The South African Process Industry. 1-5 - Wassila Lalouani

, Lloyd Emokpae:
Lightweight Zero Knowledge Proof-Based Multi Access Control Schema for Smart Telehealth System. 1-6 - Nowfel Mashnoor, Batyr Charyyev:

Network Traffic Analysis of Medical Devices. 1-6 - Chandler Scott, Mohammad S. Khan

, Biju Bajracharya, Anirudh Paranjothi
:
Trust-Based Security for Decentralized Clustering in IoV. 1-4 - Iqra Batool

, Mostafa M. Fouda
, Zubair Md Fadlullah:
Deep Learning-Based Throughput Prediction in 5G Cellular Networks. 1-6 - Amisha Gunderia, Priyansh Agarwal, Valmik B. Nikam, A. N. Bambole:

AI Approaches for Predictive Maintenance in Road Bridge Infrastructure. 1-6 - Lanlan Pan

, Ruonan Qiu, Minghui Yang:
ASDWL: Mitigating DNS Random Subdomain Attacks for Second Level Domain. 1-4 - Akram Talib Kareem, Yousif Samer Mudhafar

, Waleed Abed Abohana, Haider Salih Mahdi, Ali Hamzah Abbas:
Bidirectional Quantum Teleportation By Simultaneously Sending A Secret Classic Bit From Both Sides. 1-6 - Jialin Dong, Jiayi Wang, Lin F. Yang:

Provably Correct SGD-Based Exploration for Generalized Stochastic Bandit Problem. 1-6 - Muhammad Ahsan

, Ashfaq Ahmed, Sabit Ekin, John F. O'Hara, Arsalan Ahmad
:
Traffic-Aware Network Slicing for 5G Networks in Cloud Fog-RAN over WDM Architecture. 1-6 - Ndala Yves Mulongo:

South African Manufacturing Industry in the Aeon of Artificial Intelligence. 1-5 - Vinod Kumar Verma

:
Internet of Things Focused Optimal Distance and Boundary Algorithm for Smart Cities. 1-4 - Dirk Henrici

, Andreas Boose:
Market Study and User-Friendly Enablement of 4G/5G LAN-Like Connectivity for SOHO Customers. 1-4 - Abdallah Mohammad, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:

IoT-Based Plant Disease Detection using Machine Learning: A Systematic Literature Review. 1-7 - Nadine Danielle Reyes, Russtin Tolentino, Nestor Michael C. Tiglao

:
Automated Load Identification and Consumption Prediction for Smart Energy Meters. 1-7 - Dina Jrab, Derar Eleyan, Amna Eleyan, Tarek Bejaoui:

Heart Disease Prediction Using Machine Learning Algorithms. 1-8 - Prakash Agarwal, Rajendra Hegadi

, Prathamesh P. Pai, Sudeepto Chatterjee, Siddhant Dixit:
Digital Innovation in Water Governance: Exploring the Synergy of Digital Twins and Blockchain. 1-7 - Ravi Chandra Thota

, Sarawat Murtaza Sara, Md. Yusuf Sarwar Uddin, Majid Bani-Yaghoub, Gary Sutkin:
Accurate Estimation of Individual Transmission Rates Through Contact Analytics Using UWB Based Indoor Location Data. 1-8 - Mahmoud Darwich, Kasem Khalil, Magdy A. Bayoumi:

Scalable Video Streaming Solutions Using Federated Learning. 1-6 - Wordh Ul Hasan, Kimia Tuz Zaman, Mohammed Shalan, Xin Wang, Juan Li, Bo Xie, Cui Tao:

CareCompanion: A Personalized Virtual Assistant for Enhancing Support and Independence in ADRD Patients and Older Adults. 1-10 - Sayed Erfan Arefin, Abdul Serwadda:

The Road to Web 3.0: Empirical Insights into Full Node Workload in the Bitcoin Blockchain. 1-6 - Eyad Gad, Zubair Md Fadlullah, Mostafa M. Fouda

:
A Robust Federated Learning Approach for Combating Attacks Against IoT Systems Under Non-IID Challenges. 1-6 - E. S. Santana, L. A. O. Arenas, E. V. Liberado:

Energy Harvesting Integration with Air Quality Monitoring Systems. 1-4 - Wassila Lalouani

, Ivan Omorogbe, Christopher Dube, Mohamed Baza, Amar Rasheed, Kim-Kwang Raymond Choo:
A Robust Physical Layer IDS for Intra-Vehicle Communication Security. 1-6 - Waleed Abed Abohana, Yousif Samer Mudhafar

, Akram Talib Kareem, Haider Salih Mahdi, Ali Hamzah Abbas:
Scheme of Quantum Controlled Teleportation with Authentication Step. 1-6 - Jack Zhu, Jingwen Tan, Wencen Wu

:
Data-Driven End-to-End Lighting Automation Based on Human Residential Trajectory Analysis. 1-6 - Feifei Yang, Xiying Zuo, Bruce Denby:

Privacy-Preserving Randomized-MAC WiFi Client Counting with Short-Term-Coherent Waveform Features and a Bayesian Information Criterion. 1-5 - Ahmed T. El-Toukhy, Islam Elgarhy

, Mahmoud M. Badr
, Mohamed Mahmoud, Mostafa M. Fouda
, Mohamed I. Ibrahem, Fathi Amsaad:
Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks. 1-6 - Hassane Aissaoui-Mehrez:

Proof of Concept: TIs over Bluetooth Implementation. 1-4 - Sérgio Moita, Rui S. Moreira

, Feliz Gouveia, José M. Torres, Maria Simas Guerreiro
, Diogo Ferreira, Sara Sucena
, Maria Alzira Dinis
:
An Object-Based Detection Approach for Automating City Accessibility Constraints Mapping. 1-7 - Hillol Biswas

, Muthyala Manoj Kumar
:
SCADA-Wireshark Testbed Data-Based Exploratory Data Analytics and Intrusion Detection. 1-6 - Hamid Akbarian, Imadeldin Mahgoub, Andre Williams:

Autoencoder-K-Means Algorithm for Efficient Anomaly Detection to Improve Space Operations. 1-6 - Catalina Aranzazu Suescun, Luis Felipe Zapata Rivera, Owen Guerra-Mondragon Saenz, Jacob Michael Christensen:

Securing IoT Surveillance Airport Infrastructure. 1-7 - Faruk Pasic, Markus Hofer, Mariam Mussbah, Sebastian Caban, Stefan Schwarz, Thomas Zemen

, Christoph F. Mecklenbräuker:
Channel Estimation for mmWave MIMO Using Sub-6 GHz Out-of-Band Information. 1-6 - Adamu Ibrahim Tafida, Noor Amila Bt Wan Zawawi, Wesam Salah Alaloul, Muhammad Ali Musarat:

A Systematic Review of the Use of Computer Vision and Photogrammetry Tools in Learning-Based Dimensional Road Pavement Defect Detection for Smart Transportation. 1-9 - Mamadou Ba

, Thierry Kondengar
, Abagana Mahamat Kachallah
, Ibrahima Ngom, Samuel Ouya, Mbaye Ndiaye Samb:
Deployment of Next-Gen 5G NSA Networks for Awareness Campaigns in Rural Africa. 1-6 - Suk-Jin Lee, Ahmad Salman

, Hsuan-Yun Chang:
Mutual Authentication Protocol using ECC and Hardware Security Module for IoT Devices. 1-6 - Brennon Hahs, Kanika Sood, Desiree Gomez:

A Data-Driven Model for Wildfire Prediction in California. 1-6 - Shay Reardon, Murtadha D. Hssayeni

, Imadeldin Mahgoub:
Detection of Zero-Day Attacks on IoT. 1-5 - Brahma Reddy Tanuboddi, Gad Gad, Zubair Md Fadlullah, Mostafa M. Fouda

:
Optimizing VNF Migration in B5G Core Networks: A Machine Learning Approach. 1-5 - Haofan Wang, Farah I. Kandah

:
Multi-Critics Generative Adversarial Networks for Imbalanced Data in Intrusion Detection System. 1-6 - Jameela Al-Jaroodi, Nader Mohamed:

Enhancing the Efficiency of Healthcare Facilities Management with Digital Twins. 1-5 - Xin-Wen Wu, Yongtao Cao, Richard Dankwa:

Pareto-Optimal Machine Learning Models for Security of IoT Applications. 1-6 - Gautam Siwach

, Abhishek Jain
:
Quantum Annotated AI Modelling of Digital Assets. 1-6 - Ndala Yves Mulongo:

Redefining Teaching and Learning Practices in the Post-Covid-19 Pandemic Era. 1-6 - Ismail Butun, Imad Mahgoub:

Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of-Battlefield Things (IoBT). 1-7 - Anmol Agarwal

, Rakshesh P. Bhatt, Clifton Fernandes:
End-to-End System Level Solution for DDoS Attack Detection and Prediction for 5G and Future Wireless Networks. 1-7 - Alireza Abolhasani Zeraatkar

, Parnian Shabani Kamran, Inderpreet Kaur, Nagabindu Ramu, Tyler Sheaves, Hussain Al-Asaad:
On the Performance of Malware Detection Classifiers Using Hardware Performance Counters. 1-6 - Nader Mohamed, Jameela Al-Jaroodi:

A Framework for Energy-Efficient Manufacturing using Digital Twins. 1-5 - Samer Kadhim Jawad, Satea Hikmat Alnajjar:

Enhancing Phishing Detection Through Ensemble Learning and Cross-Validation. 1-7 - Farzana Akhter, Joseph P. Near:

Energy Efficient Data Routing for IoT Networks Using Genetic Algorithm. 1-8 - Ali Ghubaish, Zebo Yang

, Raj Jain:
HDRL-IDS: A Hybrid Deep Reinforcement Learning Intrusion Detection System for Enhancing the Security of Medical Applications in 5G Networks. 1-6 - Waseem Raza, Muhammad Umar Bin Farooq, Aneeqa Ijaz, Ali Imran:

Data-Driven Intelligent Outage Management for High Shadowing Environments in 5G&B Networks. 1-6 - Akshayraj Madhubalan

, Amit Gautam
, Priya Tiwary
:
Blender-GAN: Multi-Target Conditional Generative Adversarial Network for Novel Class Synthetic Data Generation. 1-7 - Qiuyang Feng, Fuxiang Chen, Xingle Feng:

Improved YOLOv5s Lightweight Vehicle Axle Recognition Model. 1-6 - Tarek Ali, Amna Eleyan, Tarek Bejaoui, Mohammed Al-Khalidi:

Lightweight Intrusion Detection System with GAN-Based Knowledge Distillation. 1-7 - Giovanny Vazquez, Shengjie Zhai, Mei Yang:

Transfer Learning Enhanced Deep Learning Model for Wildfire Flame and Smoke Detection. 1-4 - Mnassar Alyami, Cliff C. Zou, Yan Solihin:

Adaptive Segmentation: A Tradeoff Between Packet-Size Obfuscation and Performance. 1-4 - Ibrahim Tariq Javed, Victoria L. Lemieux, Dean A. Regier:

SecureConsent: A Blockchain-Based Dynamic and Secure Consent Management for Genomic Data Sharing. 1-7 - Joseph Tolley, Carl B. Dietrich:

Whisper-Key Location Verification Method in Cognitive Radio Networks. 1-7 - Adriano Silva:

Did ChatGPT Exterminate the Writer, Translator, Reviewer and Journalist Professions in Brazil? 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














