researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2011
2012
2014
2015
2016
2018
2019
2021
Filter by Tag
[+]
OR
AND
NOT
1
Meta-Environment
analysis
architecture
context-aware
data-flow
design
e-science
meta-model
mobile
modeling
multimedia
open-source
optimization
protocol
routing
rule-based
security
source-to-source
systematic-approach
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Ahmed Serhrouchni
Bernard Tourancheau
Dominique Gaïti
Elias Bou-Harb
Evelina Pencheva
Farkhund Iqbal
Francine Krief
George C. Polyzos
Houda Labiod
Ievgen Kabin
Ivaylo Atanasov
Kun Mean Hou
Maryline Laurent
Mohamad Badra
Omar Alfandi
Pascal Urien
Peter Langendörfer
Timo Hämäläinen 0002
Vasos Vassiliou
Zoya Dyka
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
data
detection
efficient
energy
management
mobile
mobility
network
networks
performance
protocol
routing
security
sensor
system
systems
using
wireless
NTMS (ntms)
Editions
Publications
Viewing Publication 1 - 100 from 843
2021
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems
Mohamed Nassar 0001
,
Joseph Khoury
,
Abdelkarim Erradi
,
Elias Bou-Harb
.
ntms 2021
:
1-7
[doi]
Anonymous Fair Auction on Blockchain
Gaurav Sharma 0006
,
Denis Verstraeten
,
Vishal Saraswat
,
Jean-Michel Dricot
,
Olivier Markowitch
.
ntms 2021
:
1-5
[doi]
11th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2021, Paris, France, April 19-21, 2021
IEEE,
2021.
[doi]
WhatsApp Network Forensics: Discovering the IP Addresses of Suspects
Waqas Ahmed
,
Faisal Shahzad
,
Abdul Rehman Javed
,
Farkhund Iqbal
,
Liaqat Ali Khan
.
ntms 2021
:
1-7
[doi]
A GDPR-Compliant Framework for IoT-Based Personal Health Records Using Blockchain
Bandar Alamri
,
Ibrahim Tariq Javed
,
Tiziana Margaria
.
ntms 2021
:
1-5
[doi]
Smart Contract Based Solution for Secure Distributed SDN
Mouhamad Almakhour
,
Ayoub Wehby
,
Layth Sliman
,
Abed Ellatif Samhat
,
Abdelhamid Mellouk
.
ntms 2021
:
1-6
[doi]
An Internet of Things (IoT) Homecare Management System Using Cardiac Arrhythmia Classification
Areej Almazroa
,
Hongjian Sun
.
ntms 2021
:
1-5
[doi]
Towards the Identification of Security Tokens on Ethereum
Monika Di Angelo
,
Gernot Salzer
.
ntms 2021
:
1-5
[doi]
Privacy-Preserving and Efficient Aggregation for Smart Grid based on Blockchain
Mohamad Badra
,
Rouba Borghol
.
ntms 2021
:
1-3
[doi]
Exploring the energy efficiency for Search and Rescue operations over LoRa
Christos Bouras
,
Apostolos Gkamas
,
Spyridon Aniceto Katsampiris Salgado
.
ntms 2021
:
1-5
[doi]
SDN Security through System Call Learning
Danai Chasaki
,
Christopher Mansour
.
ntms 2021
:
1-6
[doi]
Digital Forensic Investigation Process in Railway Environment
Jasmin Cosic
,
Christian Schlehuber
,
Drazen Morog
.
ntms 2021
:
1-6
[doi]
Auditchain: a mechanism for ensuring logs integrity based on proof of existence in a public blockchain
Bruno de Azevedo Mendonça
,
Paulo Matias
.
ntms 2021
:
1-5
[doi]
Blockchain Development Platforms: Performance Comparison
Iman Dernayka
,
Ali Chehab
.
ntms 2021
:
1-6
[doi]
SpeedChain: A framework for Monitoring and Alerting blockchain projects
Mouad Fakhri
,
Baptiste Zegre
,
Nouha Omrane
,
Rakia Jaziri
.
ntms 2021
:
1-5
[doi]
Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges
Vihara Fernando
.
ntms 2021
:
1-7
[doi]
Securing Building Automation Systems
Johannes Goltz
.
ntms 2021
:
1-7
[doi]
Differential Evolution for VNE-5G Scenarios
Rayner Gomes
,
Dario Vieira
,
Miguel Franklin de Castro
.
ntms 2021
:
1-6
[doi]
Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module
Vladimir Gustov
,
Alla Levina
.
ntms 2021
:
1-5
[doi]
Performance Evaluation of Pseudonym Reload over Cellular Technology
Farah Haidar
,
Farah Braiteh
,
Brigitte Lonc
,
Arnaud Kaiser
,
Pascal Urien
.
ntms 2021
:
1-4
[doi]
Performance Evaluation of Transmission Mode Selection in D2D communication
Iacovos Ioannou
,
Christophoros Christophorou
,
Vasos Vassiliou
,
Andreas Pitsillides
.
ntms 2021
:
1-7
[doi]
Discord Server Forensics: Analysis and Extraction of Digital Evidence
Farkhund Iqbal
,
Michal Motylinski
,
Áine MacDermott
.
ntms 2021
:
1-8
[doi]
FFT based Horizontal SCA Attack against ECC
Ievgen Kabin
,
Zoya Dyka
,
Dan Klann
,
Marcin Aftowicz
,
Peter Langendörfer
.
ntms 2021
:
1-5
[doi]
A Survey on the Application of Fault Analysis on Lightweight Cryptography
Patrick Karl
,
Michael Gruber
.
ntms 2021
:
1-3
[doi]
Energy-efficient Protection of IoT Networks using Trust Management on the IEEE 802.15.4 Protocol
Zeeshan Ali Khan
,
Peter Herrmann
.
ntms 2021
:
1-7
[doi]
TypoSwype: An Imaging Approach to Detect Typo-Squatting
Joon Sern Lee
,
Gui Peng David Yam
.
ntms 2021
:
1-5
[doi]
An Innovative and Decentralized Identity Framework Based on Blockchain Technology
Daniel Alejandro Maldonado-Ruiz
,
Jenny Torres 0001
,
Nour El Madhoun
,
Mohamad Badra
.
ntms 2021
:
1-8
[doi]
Implementation of Proof-of-Work Concept Algorithm using SimBlock Simulator
Viddi Mardiansyah
,
Riri Fitri Sari
.
ntms 2021
:
1-6
[doi]
Secure Distributed Medical Record Storage using Blockchain and Emergency Sharing Using Multi-Party Computation
Sudarshan Parthasarathy
,
Akash Harikrishnan
,
Gautam Narayanan
,
Lohith J. J
,
Kunwar Singh
.
ntms 2021
:
1-5
[doi]
5G Network Slice - A URLLC Resource Allocation Perspective
Christiano A. P. Rodrigues
,
Dario Vieira
,
Miguel F. De Castro
.
ntms 2021
:
1-5
[doi]
CORSICA: A Framework for Conducting Real-World Side-Channel Analysis
Jens Schlumberger
,
Stefan Wildermann
,
Jürgen Teich
.
ntms 2021
:
1-5
[doi]
Blockchain based Resource Tokenization for Crowdfunding of Wireless Network Investment
Volkan Sevindik
.
ntms 2021
:
1-5
[doi]
Massive MIMO mmWave Full Duplex Relay for IAB with Limited Dynamic Range
Chandan Kumar Sheemar
,
Dirk T. M. Slock
.
ntms 2021
:
1-5
[doi]
A Private Key Recovery Scheme Using Partial Knowledge
Har Preet Singh
,
Kyriakos Stefanidis
,
Fabian Kirstein
.
ntms 2021
:
1-5
[doi]
Towards An SDN Assisted IDS
Robert Sutton
,
Robert Ludwiniak
,
Nikolaos Pitropakis
,
Christos Chrysoulas
,
Tasos Dagiuklas
.
ntms 2021
:
1-5
[doi]
Visual Analytics of Bitcoin Mining Pool Evolution: On the Road Toward Stability?
Natkamon Tovanich
,
Nicolas Soulié
,
Petra Isenberg
.
ntms 2021
:
1-5
[doi]
An empirical evaluation of QoME for NMP
Konstantinos Tsioutas
,
George Xylomenos
,
Ioannis Doumanis
.
ntms 2021
:
1-5
[doi]
Extending the Lora modulation to add parallel channels and improve the LoRaWAN network performance
Lorenzo Vangelista
,
Alessandro Cattapan
.
ntms 2021
:
1-5
[doi]
Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks
Benjamin Yankson
,
Javed Vali K
,
Patrick C. K. Hung
,
Farkhund Iqbal
,
Liaqat Ali Khan
.
ntms 2021
:
1-7
[doi]
Evaluation of Ethereum End-to-end Transaction Latency
Lin Zhang
,
Brian Lee
,
Yuhang Ye
,
Yuansong Qiao
.
ntms 2021
:
1-5
[doi]
Scalable Wi-Fi Intrusion Detection for IoT Systems
Faik Kerem Örs
,
Mustafa Aydin
,
Aysu Bogatarkan
,
Albert Levi
.
ntms 2021
:
1-6
[doi]
2019
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
Muhammad Imran Khan 0001
,
Simon N. Foley
,
Barry O'Sullivan
.
ntms 2019
:
1-5
[doi]
A Fistful of Votes: Understanding the Voting System in Social Question and Answer Websites
Jun Zhang 0019
,
Houda Labiod
,
Weizhi Meng
.
ntms 2019
:
1-5
[doi]
10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019, Canary Islands, Spain, June 24-26, 2019
IEEE,
2019.
[doi]
Events and Objects Interaction Recognition using Aerial Videos
Fatimah Alshomrani
.
ntms 2019
:
1-4
[doi]
Collateral Use of Deployment Code for Smart Contracts in Ethereum
Monika Di Angelo
,
Gernot Salzer
.
ntms 2019
:
1-5
[doi]
Towards Principled Compilation of Ethereum Smart Contracts (SoK)
Emilio Jesús Gallego Arias
.
ntms 2019
:
1-5
[doi]
Mobile Edge Assistance Information for Radio Access Network Optimization
Ivaylo Atanasov
,
Evelina Pencheva
,
Ivaylo Asenov
.
ntms 2019
:
1-5
[doi]
An IoT-Blockchain Architecture Based on Hyperledger Framework for Healthcare Monitoring Application
Oumaima Attia
,
Ines Khoufi
,
Anis Laouiti
,
Cédric Adjih
.
ntms 2019
:
1-5
[doi]
An Asynchronous Dual Radio Opportunistic Beacon Network Protocol for Wildlife Monitoring System
Eyuel D. Ayele
,
Nirvana Meratnia
,
Paul J. M. Havinga
.
ntms 2019
:
1-7
[doi]
A Permissioned Blockchain-Based System for Verification of Academic Records
Ahmed Badr
,
Laura Rafferty
,
Qusay H. Mahmoud
,
Khalid Elgazzar
,
Patrick C. K. Hung
.
ntms 2019
:
1-5
[doi]
On the Reliability of Wireless Virtual Reality at Terahertz (THz) Frequencies
Christina Chaccour
,
Ramy Amer
,
Bo Zhou
,
Walid Saad
.
ntms 2019
:
1-5
[doi]
Wave Performance Analysis and Enhancement for Safety Applications in Vehicular Networks
Fadlallah Chbib
,
Lyes Khoukhi
,
Walid Fahs
,
Rida Khatoun
,
Jamal Haydar
.
ntms 2019
:
1-7
[doi]
Trajectory Anonymization: Balancing Usefulness about Position Information and Timestamp
Tomoki Chiba
,
Yuichi Sei
,
Yasuyuki Tahara
,
Akihiko Ohsuga
.
ntms 2019
:
1-6
[doi]
Color Medical Image Encryption using 3D Chaotic Cat Map and NCA
Un-Sook Choi
,
Sung Jin Cho
,
Sung Won Kang
.
ntms 2019
:
1-5
[doi]
A Novel Online Incremental Learning Intrusion Prevention System
Christos Constantinides
,
Stavros Shiaeles
,
Bogdan V. Ghita
,
Nicholas Kolokotronis
.
ntms 2019
:
1-6
[doi]
A Detection and Defense Approach for Content Privacy in Named Data Network
Ertugrul Dogruluk
,
António Costa
,
Joaquim Macedo
.
ntms 2019
:
1-5
[doi]
Hybrid Energy-Efficient Protocol in Delay Tolerant Networks for IoT Systems
Amr Elsaadany
,
Mohamed Aboulhassan
.
ntms 2019
:
1-6
[doi]
Cyber Threat Investigation of SCADA Modbus Activities
Claude Fachkha
.
ntms 2019
:
1-7
[doi]
An Attribute-Based Access Control using Chaincode in RFID Systems
Santiago Figueroa
,
Javier Añorga
,
Saioa Arrizabalaga
,
Iñigo Irigoyen
,
Mario Monterde
.
ntms 2019
:
1-5
[doi]
Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks
Apostolos P. Fournaris
,
Spilios Giannoulis
,
Christos Koulamas
.
ntms 2019
:
1-5
[doi]
Managing the Secure Software Development
Radek Fujdiak
,
Petr Mlynek
,
Pavel Mrnustik
,
Maros Barabas
,
Petr Blazek
,
Filip Borcik
,
Jiri Misurec
.
ntms 2019
:
1-4
[doi]
Developing Battery of Vulnerability Tests for Industrial Control Systems
Radek Fujdiak
,
Petr Blazek
,
Petr Mlynek
,
Jiri Misurec
.
ntms 2019
:
1-5
[doi]
Taxonomy and Adversarial Strategies of Random Subdomain Attacks
Harm Griffioen
,
Christian Doerr
.
ntms 2019
:
1-5
[doi]
Risk Analysis on C-ITS Pseudonymity Aspects
Farah Haidar
,
Arnaud Kaiser
,
Brigitte Lonc
,
Pascal Urien
.
ntms 2019
:
1-5
[doi]
An Internet of Things (IoT)-Based Coverage Monitoring for Mission Critical Regions
Shagufta Henna
,
Alan Davy
,
Hasan Ali Khattak
,
Abid Ali Minhas
.
ntms 2019
:
1-5
[doi]
A New Network Model for Cyber Threat Intelligence Sharing using Blockchain Technology
Daire Homan
,
Ian Shiel
,
Christina Thorpe
.
ntms 2019
:
1-6
[doi]
Authentication Layer for IEC 61113-3 Applications
Aydin E. Homay
,
Christos Chrysoulas
,
Mário de Sousa
.
ntms 2019
:
1-5
[doi]
Competitive Market for Joint Access and Backhaul Resource Allocation in Satellite-Drone Networks
Ye Hu
,
Mingzhe Chen
,
Walid Saad
.
ntms 2019
:
1-5
[doi]
On the Complexity of Attacking Commercial Authentication Products
Ievgen Kabin
,
Zoya Dyka
,
Dan Klann
,
Peter Langendörfer
.
ntms 2019
:
1-6
[doi]
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods
Ievgen Kabin
,
Marcin Aftowicz
,
Yauhen Varabei
,
Dan Klann
,
Zoya Dyka
,
Peter Langendörfer
.
ntms 2019
:
1-7
[doi]
Balancing Security Guarantees vs QoS Provisioning in Combined Fog-to-Cloud Systems
Sarang Kahvazadeh
,
Xavi Masip-Bruin
,
Rodrigo Diaz
,
Eva Marín-Tordera
,
Alejandro Jurnet
,
Jordi Garcia
,
Ana Juan Ferrer
,
Ester Simó
.
ntms 2019
:
1-6
[doi]
Improving Strong Mobile Authentication with Structural Diversity and User-Friendliness
Samy Kambou
,
Ahmed Bouabdallah
.
ntms 2019
:
1-5
[doi]
Secure Data Sharing with Fast Access Revocation through Untrusted Clouds
Katarzyna Kapusta
,
Han Qiu
,
Gérard Memmi
.
ntms 2019
:
1-5
[doi]
Urban Sensing: Towards Security Efficient Sensing Network Scheme
Salam Ismail Rasheed Khanji
,
Mohamad Badra
,
Omar Alfandi
,
Rouba Borghol
.
ntms 2019
:
1-7
[doi]
An Intrusion Detection and Response Scheme for CP-ABE-Encrypted IoT Networks
Younes Laaboudi
,
Alexis Olivereau
,
Nouha Oualha
.
ntms 2019
:
1-5
[doi]
Cybersecurity in Protection of Soft Targets
Dora Lapkova
,
David Malaník
,
Lukas Kralik
,
Lukas Kotek
.
ntms 2019
:
1-6
[doi]
Combating Ransomware using Content Analysis and Complex File Events
Michael J. May
,
Etamar Laron
.
ntms 2019
:
1-5
[doi]
Porthos: Macroprogramming Blockchain Systems
Adrian Mizzi
,
Joshua Ellul
,
Gordon J. Pace
.
ntms 2019
:
1-5
[doi]
Post-Quantum Signature Schemes for Efficient Hardware Implementation
Dmitriy N. Moldovyan
,
Alexander A. Moldovyan
,
Nicolas Sklavos
.
ntms 2019
:
1-5
[doi]
Real-Time Detection of Cyberbullying in Arabic Twitter Streams
Djedjiga Mouheb
,
Masa Hilal Abushamleh
,
Maya Hilal Abushamleh
,
Zaher Al Aghbari
,
Ibrahim Kamel
.
ntms 2019
:
1-5
[doi]
Security Interoperability for Cooperative ITS: Architecture and Validation
Mounira Msahli
,
Houda Labiod
,
Gilles Ampt
.
ntms 2019
:
1-6
[doi]
Detecting Intrusive Behaviour of People in a Building through Data Analysis and Anomaly Detection in Home Automation Systems
Thomas Mundt
,
Simeon Wiedenmann
,
Johannes Goltz
,
Johann Bauer
,
Maximilian Jung
.
ntms 2019
:
1-7
[doi]
Survey of Formal Verification Methods for Smart Contracts on Blockchain
Yvonne Murray
,
David A. Anisi
.
ntms 2019
:
1-6
[doi]
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities
Syed Naqvi
,
Sean Enderby
,
Ian Williams
,
Waqar Asif
,
Muttukrishnan Rajarajan
,
Cristi Potlog
,
Monica Florea
.
ntms 2019
:
1-6
[doi]
Mobility Management as a Radio Access Network Service
Evelina Pencheva
,
Ivaylo Atanasov
,
Ivaylo Asenov
,
Ventsislav Trifonov
.
ntms 2019
:
1-5
[doi]
Evaluating Spread of 'Gasless Send' in Ethereum Smart Contracts
David Prechtel
,
Tobias Groß
,
Tilo Müller
.
ntms 2019
:
1-6
[doi]
FPGA Implementation of pAsynch Design Paradigm
Yehuda Rudin
,
Itamar Levi
,
Alexander Fish
,
Osnat Keren
.
ntms 2019
:
1-5
[doi]
Performance Analysis of LoRa Technology in Wireless Sensor Networks
Dragos Ioan Sacaleanu
,
Irina Petra Manciu
,
Lucian Andrei Perisoara
.
ntms 2019
:
1-5
[doi]
Assessment Technologies of Communication Quality in MANET Networks
Evgeny S. Sagatov
,
Andrei M. Sukhov
.
ntms 2019
:
1-5
[doi]
Analysis of Network Threats Based on Data from Server-Traps
Evgeny S. Sagatov
,
D. A. Shkirdov
,
Andrei M. Sukhov
.
ntms 2019
:
1-5
[doi]
Big Data Technology in Healthcare: A Survey
Vatsal J. Saglani
,
Bharat S. Rawal
,
V. Vijayakumar
,
Longzhi Yang
.
ntms 2019
:
1-5
[doi]
Influence of Internet Protocols and CDN on Web Browsing
Antoine Saverimoutou
,
Bertrand Mathieu
,
Sandrine Vaton
.
ntms 2019
:
1-5
[doi]
Monitoring Leaked Confidential Data
Slim Trabelsi
.
ntms 2019
:
1-5
[doi]
Introducing Innovative Bare Metal Crypto Terminal for Blockchains and BigBang Paradigm
Pascal Urien
.
ntms 2019
:
1-4
[doi]
IoT in Effective Distance Learning Process
Rodion Yakoubovsky
,
Viliam Sarian
.
ntms 2019
:
1-4
[doi]
SSH Key Management Challenges and Requirements
Tatu Ylönen
.
ntms 2019
:
1-5
[doi]
Compact Sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security Applications
David Zooker Zabib
,
Alexander Fish
,
Osnat Keren
,
Yoav Weizman
.
ntms 2019
:
1-5
[doi]
Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance
Francesco Zola
,
Cristina Pérez-Solà
,
Jon Egaña Zubia
,
Maria Eguimendia
,
Jordi Herrera-Joancomartí
.
ntms 2019
:
1-5
[doi]
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
Áine MacDermott
,
Stephen Lea
,
Farkhund Iqbal
,
Ibrahim Idowu
,
Babar Shah
.
ntms 2019
:
1-6
[doi]
Sign in
or
sign up
to see more results.