Abstract is missing.
- Papering over the cracks: The effects of introducing best practices on the web security ecosystemEmil Larsson, Johan Sigholm. 1-6 [doi]
- On the use of proxy re-encryption to control access to sensitive data on information centric networkingRoan Simocs da Silva, Sérgio Donizetti Zorzo. 7-12 [doi]
- Signing key leak detection in Google Play StoreLong Nguyen-Vu, Jungsoo Park, Ngoc-Tu Chau, Souhwan Jung. 13-16 [doi]
- Android component vulnerabities: Proof of concepts and mitigationBharat Buddhdev, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi. 17-22 [doi]
- Enhancing performance of cardinality analysis by packet filteringShinichi Mori, Akira Sato, Kenichi Yoshida. 23-28 [doi]
- Spatially dependent loss tomography for multihop wireless networksTatsuya Morita, Takahiro Matsuda, Tetsuya Takine. 29-34 [doi]
- A study on penetration strategy of on-board unit taking account of the type of vehicles in V2V communicationsHiroaki Minami, Yumi Takaki, Chikara Ohta, Hisashi Tamaki. 35-39 [doi]
- Selection of relay UE with energy harvesting capabilities in public safety environmentDaniyal Munir, Syed Tariq Shah, Won-Jin Lee, Min Young Chung, Syed Faraz Hasan. 40-44 [doi]
- Collision avoidance scheme for micro UAVs delivering informationHyo Hyun Choi, Areeya Rubenecia, Paul Vincent Contreras, Myungwhan Choi. 45-50 [doi]
- Control of transmission power and carrier sense threshold to enhance throughput and fairness for dense WLANsIrda Roslan, Takahiro Kawasaki, Toshiki Nishiue, Yumi Takaki, Chikara Ohta, Hisashi Tamaki. 51-56 [doi]
- An implementation of privacy preserving stream integration systemJunpei Kawamoto. 57-62 [doi]
- Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle networkHyun Min Song, Ha Rang Kim, Huy Kang Kim. 63-68 [doi]
- An incident response support system based on seriousness of infectionHirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura. 69-74 [doi]
- An anonymous IP-based privacy protection routing mechanism for CDNiShi Li, Inshil Doh, Kijoon Chae. 75-80 [doi]
- Reliable and Efficient Multi-rate Aware Reactive (REMAR) routing for IEEE 802.11 based MANETAhmed Khalid, Hyeongtae Ahn, Cheeha Kim. 81-85 [doi]
- A security testing platform for Wireless Sensor NetworksMin Wei, Shuaidong Zhang, Keecheon Kim. 86-91 [doi]
- An iterative method of processing node flip ambiguity in wireless sensor networks node localizationYang Song, Enqing Dong, Wei Liu, Xue Peng. 92-97 [doi]
- Exploring energy-latency trade-off for broadcast in duty-cycled Wireless Sensor NetworksDuc Tai Le, Thang Le Duc, Taeho Kong, Vyacheslav V. Zalyubovskiy, Hyunseung Choo. 98-101 [doi]
- A routing based on OLSR with traffic load balancing and QoS for Wi-Fi mesh networkKazuhiro Yamaguchi, Takaharu Nagahashi, Takuya Akiyama, Takahiro Yamaguchi, Hideaki Matsue. 102-107 [doi]
- A robust node localization method to address flip ambiguity in wireless networksWei Liu, Enqing Dong, Yang Song. 108-113 [doi]
- Performance analysis of routing methods based on OLSR and AODV with traffic load balancing and QoS for Wi-Fi mesh networkKazuhiro Yamaguchi, Kazunari Mukaiyama, Takuya Akiyama, Tomohiro Kobayashi, Hideaki Matsue. 114-119 [doi]
- Performance analysis of two high rate routing protocols for wireless sensor networks based on the Linux platformJuan Xu, Enqing Dong, Dejing Zhang, Wei Liu, Weichong Zhong. 120-123 [doi]
- Congestion prevention mechanism based on Q-leaning for efficient routing in SDNSeonhyeok Kim, Jae Hyeok Son, Ashis Talukder, Choong Seon Hong. 124-128 [doi]
- A MultiCriteria Caching Decision for information centric networksIgor Carvalho, Airton Ishimori, Antonio Abelém. 129-134 [doi]
- Content allocation in information-centric networksSungyeon Kim, Jang-Won Lee. 135-140 [doi]
- On adaptive pre-fetching and caching the contents in content centric networkingKyi Thar, Saeed Ullah, Doo Ho Lee, Choong Seon Hong. 141-146 [doi]
- Energy savings in processor based on prediction techniqueDinh-Mao Bui, Thien Huynh-The, Sungyoung Lee, Yongik Yoon 0001, SungIk Jun. 147-150 [doi]
- Optimization of receiver FIFO for IEEE 802.3ba 40GBASE PCS Sub layerAnuradha Nanayakkara, Subramaniam Thayaparan. 151-154 [doi]
- Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPsPengcheng Du, Jessie Hui Wang, Jiahai Yang, Jianfeng Wang, Youjian Zhao. 155-160 [doi]
- Infrastructure-based delay tolerant network communicationYasser Mawad, Stefan Fischer. 161-165 [doi]
- MLCS: A multi-level correlation scheduling algorithm for multipath transportBo Hu, Lin Xing, Zeng Wang, Na Liu. 166-171 [doi]
- Deadline-aware packet routing based on optimal charging schedule in electric vehicular networksNusrat Sharmin, HyungJune Lee. 172-177 [doi]
- Parametric spanning tree generation method for network topology designKazuaki Ova, Toshinori Watanabe, Hisashi Koga. 178-183 [doi]
- Equalizing latency peaks using a redundant multipath-TCP schemeAxel Hunger, Pascal A. Klein. 184-189 [doi]
- Client-side rate adaptation scheme for HTTP adaptive streaming based on playout buffer modelJiwoo Park, Kwangsue Chung. 190-194 [doi]
- Traffic engineering for IoTMasafumi Katoh, Izuru Sato, Naotoshi Watanabe. 195-200 [doi]
- Video quality adaptation scheme for improving QoE in HTTP adaptive streamingSangwook Kim, Dooyeol Yun, Kwangsue Chung. 201-205 [doi]
- Dynamic segment duration control for live streaming over HTTPDooyeol Yun, Kwangsue Chung. 206-210 [doi]
- A research on the regional routing scheme based mobile agent for SDNMi Young Jo, Keecheon Kim. 211-213 [doi]
- ERIC: Economical & reconfigurable hybrid-band control for software-defined datacenter networkCheng Suo, I-Chen Tsai, Charles H.-P. Wen. 214-219 [doi]
- Forwarding strategy on SDN-based content centric network for efficient content deliveryJae Hyeok Son, Dohyeon Kim, Hyo-Sung Kang, Choong Seon Hong. 220-225 [doi]
- ONU-based Decentralized Dynamic Bandwidth Allocation (OD-DBA) scheme over WDM long-reach EPONsHui-Tang Lin, Chia-Lin Lai, Yu-Ying Kao, Tzy Shiah Wang. 226-231 [doi]
- TRINPON: A novel network architecture for supporting private networking capability over LR EPONsHui-Tang Lin, Chia-Lin Lai, Wen-Yi Chen, Tzy Shiah Wang. 232-237 [doi]
- SaaS virtualization method and its applicationHeihachiro Yamaguchi, Masayuki Ida. 238-243 [doi]
- Cloud-based virtual desktop service using lightweight network display protocolSunwook Kim, JiHyeok Choi, Seongwoon Kim, HagYoung Kim. 244-248 [doi]
- An adaptive monitoring framework for ensuring accountability and quality of services in cloud computingHassan Mahmood Khan, Gaik-Yee Chan, Fang-Fang Chua. 249-253 [doi]
- Resource allocation optimization in LTE-A/5G networks using big data analyticsP. Kiran, M. G. Jibukumar, C. V. Premkumar. 254-259 [doi]
- A multiple beam management scheme on 5G mobile communication systems for supporting high mobilityJun Suk Kim, Won-Jin Lee, Min Young Chung. 260-264 [doi]
- A multihop data-gathering scheme using multiple AUVs in hierarchical underwater sensor networksJawaad Ullah Khan, Ho-Shin Cho. 265-267 [doi]
- The dynamic sub-topology load balancing algorithm for data center networksLiming Wang, Gang Lu. 268-273 [doi]
- Multi-flow rate control in delayed Wi-Fi offloading systemsYeongjin Kim, Joohyun Lee, Jaeseong Jeong, Song Chong. 274-279 [doi]
- Wireless offline offloadJani Väre, Kari Virtanen, Kimmo Ylander. 280-284 [doi]
- Multi-agent and reinforcement learning based code offloading in mobile fogMd. Golam Rabiul Alam, Yan Kyaw Tun, Choong Seon Hong. 285-290 [doi]
- An optimized fingerprint positioning algorithm for underground garage environmentHailong Lin, Lei Chen. 291-296 [doi]
- A feasibility study of ARPS in UAT for positioningKyu-Man Lee, JaeSung Lim, Sunju Choi. 297-302 [doi]
- A WLAN planning method for indoor positioning systemZhaoyu Zhang, Xin Di, Jun Tian, Pei Chen. 303-307 [doi]
- A study on the adaptation of the firefly algorithm for the synchronization between multiple controllers in SDN environmentGreen Kim, Keecheon Kim. 308-311 [doi]
- A distributed mobile cloud computing model for secure big dataSoonhwa Sung, Cheong Youn, Eunbae Kong, Jaecheol Ryou. 312-316 [doi]
- Service recommendation system for big data analysisTai-Yeon Ku, Hee-Sun Won, Hoon Choi. 317-320 [doi]
- Analytics-leveraged box visibility for resource-aware orchestration of SmartX multi-site cloudJung-Su Han, JongWon Kim. 321-323 [doi]
- An overlapping coalition formation approach to maximize payoffs in cloud computing environmentAnupam Kumar Bairagi, Md. Golam Rabiul Alam, Ashis Talukder, Nguyen H. Tran, Daeun Lee, Choong Seon Hong. 324-329 [doi]
- P2P network organization method for low signaling overhead and delayChang-Kyu Lee, Wook Hyun, Shin-Gak Kang, Juyoung Park. 330-333 [doi]
- SIP amplification attack analysis and detection in VoLTE service networkEunhye Ko, Seongmin Park, Sekwon Kim, Kyungho Son, Hwankuk Kim. 334-336 [doi]
- SDN-based distributed mobility managementHyunsik Yang, Younghan Kim. 337-342 [doi]
- Design of distributed memory integration framework(DMIf)Shin-Young Ahn, Gyu-Il Cha, Young-Ho Kim, Eun-Ji Lim, Seung-Jo Bae, Won-Young Kim. 343-347 [doi]
- An experimental continuous delivery framework for SmartX-mini IoT-cloud playgroundJeongju Bae, JongWon Kim. 348-350 [doi]
- Ontology-based open API composition method for automatic mash-up service generationSang-Il Kim, Hwa-sung Kim. 351-356 [doi]
- Design of an effective framework for mash-up service developmentTaeyoung Kim, Hyeonwoo Kim, Dongwoo Kwon, Kisu Ok, Isaac Im, Eunggi Lee, Huigwang Je, Nematullo Rakhmatov, Donghyeok An, Hongtaek Ju. 357-359 [doi]
- A study on movable thing edge service platformEungha Kim, ChangSup Keum. 360-362 [doi]
- oneM2M: Extension of protocol binding: Reuse of binding protocol's legacy servicesJun Hwan Huh, Dong-hyun Kim, Jong-Deok Kim. 363-365 [doi]
- The cluster formation strategies for approximate decoding in IoT networksMinhae Kwon, Hyunggon Park. 366-368 [doi]
- IoT learning model based on virtual object cognitionM. Golam Kibria, Hwa-Suk Kim, Ilyoung Chong. 369-371 [doi]
- Design of composite virtual objects for service entity creation in WoO based IoT environmentSheik Mohammad Mostakim Fattah, Hwa-Suk Kim, Ilyoung Chong. 372-374 [doi]
- Programmable multi-hop wireless networks towards IoT: Architecture and key techniquesXin Di, Jun Tian, Jie Wu, Zhou Zhu. 375-377 [doi]
- Topic naming service for DDSGunjae Yoon, Jungwoo Choi, Huihwan Park, Hoon Choi. 378-381 [doi]
- A network coding aware routing with considering traffic load balancing for the multi-hop wireless networksMinho Jeong, Sang-Hyun Ahn, Hayoung Oh. 382-384 [doi]
- Channel modeling and system analysis for seaside image sensor communicationsChang Hyun Hong, Trang Nguyen, Se Bong Jang, Seong-Ho Jeong, Seung Hyong Rhee, Yeong Min Jang. 385-389 [doi]
- Efficient parallel multi-path interest forwarding for mobile user in CCNDoo Ho Lee, Kyi Thar, Dohyeon Kim, Choong Seon Hong. 390-394 [doi]
- Channel bonding algorithm for densely deployed wireless LANTaewon Song, Tae-Yoon Kim, Wonjung Kim, Sangheon Pack. 395-397 [doi]
- Design and implementation of access point for the Wi-Fi broadcasting systemDong-hyun Kim, Sheng Hao Sun, Jong-Deok Kim. 398-401 [doi]
- Modeling and anaysis of an energy-efficient MAC protocol for wireless sensor networksHyungkeun Lee, Hyukjoon Lee. 402-405 [doi]
- Improving time slot acquisition through RSU's coordination for TDMA-based MAC protocol in VANETsVan Dung Nguyen, Oanh Tran Thi Kim, Nguyen Dang Tri, Choong Seon Hong. 406-411 [doi]
- An energy efficiency evaluation scheme for manufacturing facilitySangjin Jeong, Yong-Woon Kim. 412-415 [doi]
- Android application for WiFi based indoor position: System design and performance analysisNguyen Trong Thuong, Hoac Thieu Phong, Dinh-Thuan Do, Phan Van Hieu, Dao Tang Loc. 416-419 [doi]
- A congestion avoidance algorithm in SDN environmentSeungbeom Song, Jaiyong Lee, Kyuho Son, Hangyong Jung, Jihoon Lee. 420-423 [doi]
- Evaluations of a multiple flow tables construction scheme for service function chainingEun-Do Kim, Seungik Lee, Yunchul Choi, Myung-Ki Shin, Hyoung Jun Kim. 424-426 [doi]
- Resource monitoring and visualization for OF@TEIN SDN-enabled multi-site cloudMuhammad Usman 0012, Aris Cahyadi Risdianto, JongWon Kim. 427-429 [doi]
- A frame buffer caching for fast launch of browsersKyusik Kim, Taeseok Kim. 430-432 [doi]
- Multi-band OFDMA based passive optical network with windowing technique for asynchronous multiple accessChang-Hun Kim, Sang-Min Jung, Sun-Young Jung, Soo-Min Kang, Sang-Kook Han. 433-435 [doi]
- InGaAs-based junctionless transistor with dual-spacer dielectric for low power loss and high frequency mobile network systemYoung Jun Yoon, Jae Hwa Seo, Ra Hee Kwon, Young In Jang, In Man Kang. 436-438 [doi]
- A fast convergence LLL algorithm with fixed-complexity for SIC-based MIMO detectionHyukyeon Lee, Hyunsub Kim, Minjoon Kim, Jaeseok Kim. 439-441 [doi]
- Design optimization of Si/Ge-based heterojunction arch-shaped gate-all-around (GAA) tunneling field-effect transistor (TFET) which applicable for future mobile communication systemsJae Hwa Seo, Young Jun Yoon, Ra Hee Kwon, Young In Jang, In Man Kang. 442-444 [doi]
- Fast user authentication method considering mobility in multi cloudsJinsook Bong, Yuhwa Suh, Yongtae Shin. 445-448 [doi]
- A network defense system for detecting and preventing potential hacking attemptsSaad Alsunbul, Phu Dung Le, Jefferson Tan, Bala Srinivasan. 449-454 [doi]
- A study on behavior-based mobile malware analysis system against evasion techniquesMijoo Kim, Tae-Jin Lee, Youngsang Shin, Heung-Youl Youm. 455-457 [doi]
- Vulnerability detection mechanism based on open API for multi-user's convenienceSung-Soo Kim, Daeun Lee, Choong Seon Hong. 458-462 [doi]
- Securing information flow in content delivery networks with visual and quantum cryptographyNishat I. Mowla, Inshil Doh, Kijoon Chae. 463-468 [doi]
- Collaborative local triangles counting in a graph stream by using node resourcesJi-Yong Kim, Ok-Gee Min. 469-471 [doi]
- Semantic relationship of contents using tensor factorization for self-growth social broadcastingSvetlana Kim, Yong-Ik Yoon 0001. 472-475 [doi]
- Efficient streaming over CoAPGyuhong Choi, Do-Hyung Kim, Ikjun Yeom. 476-478 [doi]
- Optical camera communications based invisible watermarking techniqueNam Tuan Le, Thithanhnhan Le, Yeong Min Jang. 479-481 [doi]