Abstract is missing.
- Experimental Evaluation of Cellular Networks for UAV Operation and ServicesHugo Marques, Paulo Marques 0002, Jorge Ribeiro, Tiago Alves, Luis Pereira. 1-6 [doi]
- SFDDM: A Secure Distributed Database Management in Combined Fog-to-Cloud SystemsSouvik Sengupta 0002, Sarang Kahvazadeh, Xavi Masip-Bruin, Jordi Garcia. 1-7 [doi]
- Open CLORO: An Open Testbed for Cloud RoboticsGiuseppe Portaluri, Mike Oluwatayo Ojo, Stefano Giordano, Marialaura Tamburello, Giuseppe Caruso. 1-5 [doi]
- Q-Learning Assisted Energy-Aware Traffic Offloading and Cell Switching in Heterogeneous NetworksAttai Ibrahim Abubakar, Metin Öztürk, Sajjad Hussain, Muhammad Ali Imran. 1-6 [doi]
- Quality of User Experience in 5G-VANETMadiha Shahzad, Josephina Antoniou. 1-6 [doi]
- On the Design of a Fog Computing-Based, Driving Behaviour Monitoring FrameworkDimitrios Amaxilatis, Christos Tselios, Orestis Akrivopoulos, Ioannis Chatzigiannakis. 1-6 [doi]
- Tuning the Uplink Success Probability in Damaged Critical Infrastructure for VANETsGrace Khayat, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, George Mastorakis, Hoda Maalouf, Mithun Mukherjee 0001. 1-6 [doi]
- Test Framework for Communication Protocol Stack SoftwareJung-In Kim, Seung Jae Lee, Sang Hyun Lee, Jong-Han Kim, Woon-Haing Hur. 1-4 [doi]
- Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare OrganizationsGeorge Hatzivasilis, Panos Chatziadam, Nikos Petroulakis, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas, Artsiom Yautsiukhin, Michalis Antoniou, Dimitrios G. Katehakis, Marios Panayiotou. 1-6 [doi]
- On the Benefits of Multi-Domain Congestion Control in LTE NetworksZsolt Krämer, Sándor Molnár, Szilárd Solymos, Attila Mihály. 1-6 [doi]
- Cloud-Native Application Validation & Stress Testing through a Framework for Auto-Cluster DeploymentNikolaos Astyrakakis, Yannis Nikoloudakis, Ioannis Kefaloukos, Charalabos Skianis, Evangelos Pallis, Evangelos K. Markakis. 1-5 [doi]
- Power Efficient Packet Scheduling for M2M Devices over LTE/LTE-A TechnologiesHajer Ben Rekhissa, Cécile Belleudy, Philippe Bessaguet. 1-4 [doi]
- OpenCV2X Mode 4: A Simulation Extension for Cellular Vehicular Communication NetworksBrian McCarthy, Aisling O'Driscoll. 1-6 [doi]
- Coexistence of TV White Space Devices and DTV Services in Ethiopian Geolocation White Space Spectrum DatabaseHabib M. Hussien, Konstantinos Katzis, Luzango Pangani Mfupe, Ephrem T. Bekele. 1-5 [doi]
- Network Planning for Indoor Joint LTE and WLAN NetworksKiraseya Preusser, Michael Reyer, Anke Schmeink. 1-6 [doi]
- VANET-Based Smart Navigation for Emergency Evacuation and Special EventsAhmed Elbery, Hossam S. Hassanein, Nizar Zorba, Hesham A. Rakha. 1-6 [doi]
- Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data ObjectGerhard Hasslinger, Konstantinos Ntougias, Frank Hasslinger, Oliver Hohlfeld. 1-7 [doi]
- A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid InfrastructureDimitrios Pliatsios, Panagiotis G. Sarigiannidis, Thanasis Liatifis, Konstantinos Rompolos, Ilias Siniosoglou. 1-6 [doi]
- Acceptability of Digital Quality of Life Questionnaire Corroborated with Data from Tracking DevicesRozeta Draghici, Alexandra Rusu, Gabriel Ioan Prada, Anna Marie Herghelegiu, Lidia Bajenaru, Ciprian Dobre, Constandinos X. Mavromoustakis, Susanna Spinsante, Jordi Mongay Batalla, Horacio González-Velez. 1-6 [doi]
- Visualizing and Aggregating Behavior for Trust EvaluationGeorge C. Hadjichristofi, George Varveris. 1-6 [doi]
- Analysis of Growth Strategies in Social Media: The Instagram Use CasePaolo Bellavista, Luca Foschini, Nicola Ghiselli. 1-7 [doi]
- Embedded Dynamic Modification for Efficient Watermarking Using Different Medical Inputs in IoTTamara K. Al-Shayea, Jordi Mongay Batalla, Constandinos X. Mavromoustakis, George Mastorakis. 1-6 [doi]
- Machine Learning Based Frame Classification for Videos Transmitted over Mobile NetworksHadi Saki, Nabeel Khan, Maria G. Martini, Moustafa M. Nasralla. 1-6 [doi]
- Analysis of Circular and Cylindrical Array Arrangements for mmWave 5G Beamforming TechniquesDaniel G. Riviello, Francesco Di Stasio. 1-4 [doi]
- Using Blockchains to Enable Big Data Analysis of Private InformationKonstantinos Lampropoulos, Giorgos Georgakakos, Sotiris Ioannidis. 1-6 [doi]
- Blockchain Enhanced SECRET Small Cells for the 5G EnvironmentVipindev Adat, Ilias Politis, Christos Tselios, Stavros Kotsopoulos. 1-6 [doi]
- Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart HomesGeorgios Spanos, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras. 1-6 [doi]
- Analysis of Spatial and Temporal Information Variation for 10-Bit and 8-Bit Video SequencesNabajeet Barman, Nabeel Khan, Maria G. Martini. 1-6 [doi]
- Industrial CyberSecurity 4.0: Preparing the Operational Technicians for Industry 4.0Konstantinos Karampidis, Spyros Panagiotakis, Manos Vasilakis, Evangelos K. Markakis, Giorgos Papadourakis. 1-6 [doi]
- Toward Self-Adaptive Software Defined Fog Networking Architecture for IIoT and Industry 4.0Intidhar Bedhief, Luca Foschini, Paolo Bellavista, Meriem Kassar, Taoufik Aguili. 1-5 [doi]
- Cybersecurity in SMEs: The Smart-Home/Office Use CaseNikolaos Vakakis, Odysseas Nikolis, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras. 1-7 [doi]
- Towards Configurable Vulnerability Assessment in the CloudKyriakos Kritikos, Manos Papoutsakis, Sotiris Ioannidis, Kostas Magoutis. 1-6 [doi]
- IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected CarsHasna Uddin, Marcia Gibson, Ghazanfar Ali Safdar, Tahera Kalsoom, Naeem Ramzan, Masood Ur-Rehman, Muhammad Ali Imran. 1-5 [doi]
- Telco Cloud SimulatorPéter Hegyi, József Varga. 1-7 [doi]
- End-to-End Semantic Interoperability Mechanisms for IoTEftychia Lakka, Nikolaos E. Petroulakis, George Hatzivasilis, Othonas Soultatos, Manolis Michalodimitrakis, Urszula Rak, Karolina Waledzik, Darko Anicic, Vivek Kulkarni. 1-6 [doi]
- Operational Data Based Intrusion Detection System for Smart GridGeorgios Efstathopoulos, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Vasilis Argyriou, Antonios Sarigiannidis, Konstantinos Stamatakis, Michail K. Angelopoulos, Solon K. Athanasopoulos. 1-6 [doi]
- From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart HomesJavier Augusto-Gonzalez, Anastasija Collen, S. Evangelatos, M. Anagnostopoulos, Georgios Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, B. Genge, Erol Gelenbe, Niels A. Nijdam. 1-6 [doi]
- Slicing Based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless NetworksPraveen Kumar Korrai, Eva Lagunas, Shree Krishna Sharma, Symeon Chatzinotas, Björn E. Ottersten. 1-5 [doi]
- Game-Theoretic Based Power Allocation for a Full Duplex D2D NetworkHussein Chour, Youssef Nasser, Faouzi Bader, Oussama Bazzi. 1-7 [doi]
- On Fairness Optimization for Cloud Radio Access NetworksChao Liu, Emmanuel Kieffer, Pascal Bouvry. 1-5 [doi]
- On Game Theory-Based Coordination Schemes for Mobile Small CellsPanagiotis Georgakopoulos, Tafseer Akhtar, Stavros Kotsopoulos. 1-5 [doi]
- Protecting IoTs from Mirai Botnet Attacks Using BlockchainsZohaib Ahmed, Syed Muhammad Danish, Hassaan Khaliq Qureshi, Marios Lestas. 1-6 [doi]
- Data-Driven Intrusion Detection System for Small and Medium EnterprisesOgerta Elezaj, Sule Yildirim Yayilgan, Mohamed Abomhara, Prosper Yeng, Javed Ahmed. 1-7 [doi]
- Efficient Radio Resource Management Scheme in Cooperative Network using Coalition GameTafseer Akhtar, Ilias Politis, Panagiotis Georgakopoulos, Stavros Kotsopoulos. 1-6 [doi]
- Narrowband-Internet of Things (NB-IoT): Performance Evaluation in 5G Heterogeneous Wireless NetworksHassan Malik, Jeffrey Leonel Redondo Sarmiento, Muhammad Mahtab Alam, Muhammad Ali Imran. 1-6 [doi]
- Blockchain-Based Approach for e-Health Data Access Management with Privacy ProtectionLiviu-Adrian Hirtan, Piotr Krawiec, Ciprian Dobre, Jordi Mongay Batalla. 1-7 [doi]
- Intrusion Detection System Based on Network Traffic Using Deep Neural NetworksDimitra Chamou, Petros Toupas, Eleni Ketzaki, Stavros Papadopoulos 0002, Konstantinos M. Giannoutakis, Anastasios Drosou, Dimitrios Tzovaras. 1-6 [doi]
- Predictive Network Control in Multi-Connectivity Mobility for URLLC ServicesDavid Guzman, Richard Schöffauer, Gerhard Wunder. 1-7 [doi]
- Cognition Enabled IoT Platform for Industrial IoT Safety, Security and Privacy - The CHARIOT ProjectKonstantinos Loupos, Bora Caglayan, Alexandros Papageorgiou, Basile Starynkevitch, Franck Védrine, Christos Skoufis, Stelios Christofi, Bill Karakostas, Antonis Mygiakis, George Theofilis, Andrea Chiappetta, Harris Avgoustidis, George Boulougouris. 1-4 [doi]
- Motion Sensor-Based Small Cell Sleep Scheduling for 5G NetworksYusuf A. Sambo, Gianluca C. Valastro, Giancarlo M. M. Patané, Metin Öztürk, Sajjad Hussain, Muhammad Ali Imran, Daniela Panno. 1-5 [doi]
- Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT EnvironmentsOthonas Soultatos, Manos Papoutsakis, Konstantinos Fysarakis, George Hatzivasilis, Manos Michalodimitrakis, George Spanoudakis, Sotiris Ioannidis. 1-6 [doi]
- System Level Evaluation of UE-to-Network Relays in D2D-Enabled LTE NetworksSamantha Gamboa, Raghav Thanigaivel, Richard Rouil. 1-7 [doi]