Abstract is missing.
- A Survey on Data Confidentiality and Privacy in Cloud ComputingAfnan Aloraini, Mohammad Hammoudeh. [doi]
- Robust Localization in Wireless Sensor Networks via Low-rank and 'Sparse Matrix DecompositionBeatrice Rossi, Marco Patanè, Pasqualina Fragneto, Andrea Fusiello. [doi]
- Zone Divisional Approach for Energy Balanced Clustering Protocol in Wireless Sensor NetworkYounes el Assari, Mounir Arioua, Ahmed El Oualkadi, Imad Ez-zazi. [doi]
- A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication SystemsKelvin O. O. Anoh, Bamidele Adebisi, Mohammad Hammoudeh. [doi]
- Agent-based Modeling and Simulation of Virus on a Scale-Free NetworkMuhammad Yasir, Muhammad Asif Habib, Muhammad Shahid, Mudassar Ahmad. [doi]
- IoT system for Human Activity Recognition using BioHarness 3 and SmartphoneCamilo Rodriguez, Diego M. Castro, William Coral Cuellar, Jose L. Cabra, Nicolas Velasquez, Julián Colorado, Diego Mendez, Luis C. Trujillo. [doi]
- S-Shaped vs. V-Shaped Transfer Functions for Ant Lion Optimization Algorithm in Feature Selection ProblemMajdi M. Mafarja, Derar Eleyan, Salwani Abdullah, Seyedali Mirjalili. [doi]
- Steganalysis Using LSB-Focused Statistical FeaturesMudhafar M. Al-Jarrah, Zaid H. Al-Taie, Abdelrahman Aboarqoub. [doi]
- Collating and Analysing State-of-the-Art Hierarchical Routing Protocols in WSN to Increase Network Lifetime and Conserve EnergySyed Bilal Hussain Shah, Fuliang Yin, Inam Ullah Khan, Zhe Chen, Muhammad Zakarya. [doi]
- Optimization Water Leakage Detection using Wireless Sensor Networks (OWLD)Motaz Daadoo, Amna Eleyan, Derar Eleyan. [doi]
- The Message-Passing Interface and Parallel SAT-SolversLevis Zerpa. [doi]
- Modeling Interference for Wireless Sensor Network SimulatorsUmber Noreen, Ahcène Bounceur, Laurent Clavier. [doi]
- A Cloud Storage Architecture for High Data Availability, Reliability, and Fault-toleranceMai Alfawair. [doi]
- Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of ThingsUlfat Imdad, Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf. [doi]
- Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access ControlMusa Abubakar Muhammad, Aladdin Ayesh, Pooneh Bagheri Zadeh. [doi]
- Measuring the Complexity of Chaotic Time Series by Fuzzy EntropyChenxi Li, Zan Li, Lei Guan, Peihan Qi, Jiangbo Si, Benjian Hao. [doi]
- Adaptive Camera Placement for Open Heritage SitesMuath Sabha, Jacquleen Joubran Abu Daoud. [doi]
- Air Quality Monitoring Platform based on Remote Unmanned Aerial Vehicle with Wireless CommunicationS. D. Zhi, Y. B. Wei, Z. H. Yu. [doi]
- Encoding Shortest Paths in Triangular Grids for Delivery Without ErrorsGokce Caylak Kayaturan, Alexei Vernitski. [doi]
- An Improved Dynamic Load Balancing Algorithm applied to a Cafeteria System in a University CampusE. Draghmi, A. Eleyan. [doi]
- An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processesUmar Raza, James Lomax, Ibrahim Ghafir, Rupak Kharel, Ben Whiteside. [doi]
- Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture DescriptorDiaa M. Uliyan, Hamid A. Jalab, Abdelrahman Abuarqoub, Muhannad Abuhashim. [doi]
- A Survey on Internet of Thing Enabled Smart Campus ApplicationsAbdelrahman Abuarqoub, Hesham Abusaimeh, Mohammad Hammoudeh, Diaa M. Uliyan, Muhannad A. Abu-Hashem, Sharefa Murad, Mudhafar M. Al-Jarrah, Fayez Al-Fayez. [doi]
- A Convergence Time Optimization Paradigm for OSPF based Networks Through SDN SPF Protocol Computer Communications and Networks (CCN)/Delay Tolerant NetworksAsad Ali Khan, Majid Hussain, M. Zafrullah, Sultan Zia. [doi]
- Joint FEC/CRC coding scheme for energy constrained IOT devicesImad Ez-zazi, Mounir Arioua, Ahmed El Oualkadi, Younes el Assari. [doi]
- Intelligent core network for Tactile Internet systemAbdelhamied A. Ateya, Ammar Muthanna, Irina Gudkova, Anastasia Vybornova, Andrey Koucheryavy. [doi]
- A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor NetworksPeter Barker, Mohammad Hammoudeh. [doi]
- ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud StorageHatem Hassan, Ahmad Mostafa, Ahmed Shawish. [doi]
- Toward a Global WSN-Based System to Manage Road TrafficYouness Riouali, Laila Benhlima, Slimane Bah. [doi]
- The design and application of information management system for precast concretes based on IOTZ. H. Yu, Y. B. Wei, S. D. Zhi. [doi]
- An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight SecurityMuhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf. [doi]
- Recognising Activities at Home: Digital and Human SensorsJie Jiang, Riccardo Pozza, Kristrún Gunnarsdóttir, Nigel Gilbert, Klaus Moessner. [doi]
- Intel Edison based scalable platform solution for visually impaired people on W-IoTAnkit P. Navik, Vaishnavi Dirisina, Hitendra Thakkar, Madhuri R. Sharma, Aditya Bhat. [doi]
- Intelligent FH Sequence for High Security Satellite Communication: The Generation, Performance Analysis and ApplicationZan Li. [doi]
- Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT): The Case of Smart CampusSobia Arshad, Muhammad Awais Azam, Syed Hassan Ahmed, Jonathan Loo. [doi]
- Bottom up Approach for Better Requirements ElicitationMuhammad Naeem, Rehan Ashraf, Nouman Ali, Mudassar Ahmad, Muhammad Asif Habib. [doi]
- Backshoring: Main Drives and EffectsHadeel Samara, Sharefa Murad, Abdallah Qusef, Abdelrahman Abuarqoub. [doi]
- Agile servient integration with the Swarm: Automatic code generation for nodes in the Internet of ThingsPablo C. Calcina-Ccori, Laisa Caroline de Paula Costa, Geovane Fedrecheski, John Esquiagola, Marcelo Zuffo, Flávio S. Corrêa da Silva. [doi]
- Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security ProtocolsMohammad Saleh, Jaafar Gaber, Maxime Wack. [doi]
- Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing EnvironmentsJ. K. Mohsin, Liangxiu Han, Mohammad Hammoudeh, Rob Hegarty. [doi]
- FLUKES: Autonomous Log Forensics, Intelligence and Visualization ToolMonther Aldwairi, Hesham H. Alsaadi. [doi]
- Design and Development of an IoT System Prototype for Outdoor TrackingNicolas Velasquez, Camilo Medina, Diego M. Castro, Juan Camilo Acosta, Diego Mendez. [doi]
- A Shared Memory Method For Enhancing The HTNGH AlgorithmPerformance: Proposed MethodMuhannad A. Abu-Hashem, Diaa M. Uliyan, Abdelrahman Abuarqoub. [doi]
- OpenFlow switch buffer configuration methodAmmar Muthanna, Abdukodir Khakimov, Irina Gudkova, Alexander Paramonov, Andrei Vladyko, Ruslan Kirichek. [doi]
- User Centered Method for Enhancing the Adoption of Software Systems in PalestineYousef-Awwad Daraghmi, Motaz Daadoo, Derar Eleyan. [doi]
- Software Defined Network (SDN) Based Internet of Things (IoT): A Road AheadSahrish Khan Tayyaba, Munam Ali Shah, Omair Ahmad Khan, Abdul Wahab Ahmed. [doi]
- Smart airport: an IoT-based Airport Management SystemSamia Bouyakoub, Abdelkader Belkhir, Fayçal M'hamed Bouyakoub, Wassila Guebli. [doi]
- From IoT to Ephemeral Computing: Understanding Cyber-Physical InteractionsJulie A. McCann. 2 [doi]
- Towards Sustainable Smart Society: Big Data Driven ApproachesLiangxiu Han. 3 [doi]
- Distributed, Autonomous and Resilient Networks: Joint RAN and Backhaul OptimisationMuhammad Ali Imran. 4 [doi]
- Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing SystemKelvin O. O. Anoh, Bamidele Adebisi, Olamide Jogunola, Mohammad Hammoudeh. 7 [doi]
- A Survey on Authentication Techniques for the Internet of ThingsYahya Atwady, Mohammad Hammoudeh. 8 [doi]
- 5G Hetrogeneous Cellular Networks a Viable Mode for Implementing Future Smart Grid NetworksAhmed Qaddus, Saleem Aslam, Abid Ali Minhas, Abdulaziz Almazyad. 18 [doi]
- IoT Mashups: From IoT Big Data to IoT Big ServiceMarwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele, Mohammad Hammoudeh. 20 [doi]
- Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat DefenceIbrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, Umar Raza. 27 [doi]
- A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoTSteve Moffat, Mohammad Hammoudeh, Robert Hegarty. 34 [doi]
- Internet of Things for Buildings Monitoring: Experiences and ChallengesAdam Coates, Mohammad Hammoudeh, Kieran Gerard Holmes. 38 [doi]
- Motion Capture Using the Internet of Things Technology: A TutorialKieran Gerard Holmes, Adam Coates, Mohammad Hammoudeh. 40 [doi]
- A Parametric Study for Congestion Control in Queuing NetworksMazhar Hussain Malik, Abdul Majeed, Mehmet Emin Aydin, Mubasher Hussain Malik. 47 [doi]
- A state of the art survey - Impact of cyber attacks on SME'sJibran Saleem, Bamidele Adebisi, Ruth Ande, Mohammad Hammoudeh. 52 [doi]