Abstract is missing.
- Cryptanalysis and Improvement of Identity-Based Multisignature SchemeMohamed Mohammedi, Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah. [doi]
- Carbon monoxide detection: an IoT application used as a tool for civil protection services to save livesBadreddine Miles, Salim Chikhi, El-Bay Bourennane. [doi]
- A Pub/Sub SDN-Integrated Framework for IoT Traffic OrchestrationPedro F. Moraes, Joberto S. B. Martins. [doi]
- Sensitive and Private Data Analysis: A Systematic ReviewSyeda Sana e Zainab, Tahar Kechadi. [doi]
- Understanding Blockchain: Platforms, Applications and Implementation ChallengesMoneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib. [doi]
- Exploiting Bluetooth Vulnerabilities in e-Health IoT DevicesMohammed Zubair, Devrim Unal, Abdulla Al-Ali, Abdullatif Shikfa. [doi]
- Fair Coexistence of LTE and WiFi-802.11 in Unlicensed Spectrum: A Systematic Literature ReviewSumaira Mustafa, Khubaib Amjad Alam, Bilal Khan, Muhammad Habib Ullah, Pariwish Touseef. [doi]
- Combinatorial Testing of Web Services: A Systematic MappingBisma Rehman, Khubaib Amjad Alam, Mubashar Rehman, Abid Jamil, Pariwish Touseef, Rimsha Asif. [doi]
- A Versatile Emulator of MitM for the identification of vulnerabilities of IoT devices, a case of study: smartphonesMohamed Amine Khelif, Jordane Lorandel, Olivier Romain, Matthieu Regnery, Denis Baheux. [doi]
- Energy efficient Multi-hops Routing protocol based on Clusters Reorganization for wireless sensor networksFeriel Khanouche, Lydia Maouche, Foudil Mir, Mohamed Essaid Khanouche. [doi]
- Multiple Lane Road Car-Following Model using Bayesian Reasoning for Lane Change Behavior Estimation: A Smart Approach for Smart MobilityMadalin-Dorin Pop, Octavian Prostean, Gabriela Prostean. [doi]
- Survey on Cache Schemes in Heterogeneous Networks using 5G Internet of ThingsSahar Ajmal, Muteeb Bin Muzammil, Abid Jamil, Syed Manzar Abbas, Umer Iqbal, Pariwish Touseef. [doi]
- Overshooting and Cost Minimization in LTE Cellular Network Using Non-dominate Sorting Genetic Algorithm based on Laplace CrossoverMouhamed Amine Ouamri, Mohamed Azni. [doi]
- FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigmMuhammad Arslan Sarwar, Majid Hussain, Muhammad Usman Anwar, Mudassar Ahmad. [doi]
- A Comprehensive Review of Adaptive Noise Cancellation Techniques in the Internet of ThingsHafiz Shakir Mehmood, Rana Zeeshan Ahmad, M. Jehanzaib Yousuf. [doi]
- VANET's Security Concerns and Solutions: A Systematic Literature ReviewMuhammad Noman Javed, Hammad Shafiq, Khubaib Amjad Alam, Abid Jamil, Muhammad Umar Sattar. [doi]
- Scheduling Single-Task Jobs along with Bag-of-Task-Chains in Distributed SystemsGeorgios L. Stavrinides, Helen D. Karatza. [doi]
- BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through ApplicationAnum Ghaffar, Majid Hussain. [doi]
- Investigating and Experimenting Interference Mitigation by Capture Effect in LoRa NetworksCongDuc Pham, Ahcène Bounceur, Laurent Clavier, Umber Noreen, Muhammad Ehsan. [doi]
- Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and BlockchainMohammad Hammoudeh, Ibrahim Ghafir, Ahcène Bounceur, Thomas Rawlinson. [doi]
- Anomaly Behavior Analysis for IoT Network NodesJesus Pacheco, Victor Benitez, Luis Félix. [doi]
- Robust and Imperceptible Medical Image Watermarking Based on Dijkstra AlgorithmMuath AlShaikh, Lamri Laouamer, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh. [doi]
- Cloud Computing With Kubernetes Cluster Elastic ScalingBrandon Thurgood, Ruth G. Lennon. [doi]
- Buffer-Aided 5G Cooperative Networks: Considering the Source DelayMohammad Alkhawatrah, Yu Gong, Omar Aldabbas, Mohammad Hammoudeh. [doi]
- Kubernetes cluster optimization using hybrid shared-state scheduling frameworkOana-Mihaela Ungureanu, Calin Vladeanu, Robert Kooij. [doi]
- User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOTMuhammad Akhtar, Majid Hussain, Jehangir Arshad, Mudassar Ahmad. [doi]
- Two-steps QoS-aware services composition algorithm for Internet of ThingsMohamed Essaid Khanouche, Sihem Mouloudj, Melissa Hammoum. [doi]
- Blockchain Based Share Economy Trust Point: Case Study Based ValidationMuhammad Rehman shahid, Sheraz Mahmood, Sana Hafeez, Bilal Zahid, Sohail Jabbar, Rehan Ashraf. [doi]
- Road obstacle detectionRamzi Mosbah, Larbi Guezouli, Lyamine Guezouli. [doi]
- Miniaturized High Gain Antenna for Biomedical ApplicationMuhammad Yousaf, Naeem Abbas, Farooq Ali, Muhammad Munwar Iqbal, Yasar Amin, Adeel Akram. [doi]
- Temperature-based models of batteries for the simulation of Wireless Sensor NetworksNabil Kadjouh, Ahcène Bounceur, Abdelkamel Tari, Reinhardt Euler, Loïc Lagadec, Abdelkader Laouid. [doi]
- Detection of terrorist threats on Twitter using SVMKhaled Bedjou, Faiçal Azouaou, Abdelouhab Aloui. [doi]
- A New Leader Election Algorithm based on the WBS Algorithm Dedicated to Smart-citiesNabil Kadjouh, Ahcène Bounceur, Abdelkamel Tari, Loïc Lagadec, Reinhardt Euler, Madani Bezoui. [doi]
- A Low Power Boundary Nodes Detection Algorithm for Wireless Sensor Networks (WSNs)Ahmad Lhwani, Abed-Alrhman Mosallam, Aws Alawneh, Ahmed Awad, Othman Othman. [doi]
- Towards gait analysis - Creating a setup for the analyses under laboratory conditionsMaik Benndorf, Martin Gaedke, Thomas Haenselmann. [doi]
- LRAP: A Learned Reflex Action Embedded Associative Context Learning based Processing Efficient Paradigm in Visual Sensor NetworksAhmad Bilal, Majid Hussain. [doi]
- Sentiment Analysis on Arabic Content in Social Media: Hybrid Model of Dictionary Based and Fuzzy LogicAmjad Rattrout, Ateeq Ateeq. [doi]
- External Device to Protect the Software-Defined Network Performance in Case of a Malicious AttackAbdullah Soliman Alshra'a, Jochen Seitz. [doi]
- A wider picture of trust: confronting multi-contextual social traits for trust inferenceKarim Akilal, Mawloud Omar, Hachem Slimani. [doi]
- WorkFlow Application Scheduling in Cloud Computing: A Systematic Literature Review (SLR)Rimsha Asif, Khubaib Amjad Alam, Abid Jamil, Pariwish Touseef, Bisma Rehman. [doi]
- An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic AlgorithmsMohammed Amine Yagoub, Abdelkader Laouid, Ahcène Bounceur, Muath AlShaikh. [doi]
- FogNetwork Orchestration for Heterogeneous NetworksRaghad Jawabreh, Narmeen Darawshe, Othman Othman M. M., Ahmed Awad. [doi]
- Smart Contracts Search Engine in BlockchainHien Tran, Tarek Menouer, Patrice Darmon, Abdoulaye Doucoure, François Binder. [doi]
- Behavior-Based Outlier Detection for Network Access Control SystemsMusa Abubakar Muhammad, Aladdin Ayesh, Isabel Wagner. [doi]
- Analysis of Automated Web Application Security Vulnerabilities TestingPariwish Touseef, Khubaib Amjad Alam, Abid Jamil, Hamza Tauseef, Sahar Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa. [doi]
- A Lightweight Two-Factor Authentication Scheme for Mobile Cloud ComputingAbdelrahman Abuarqoub. [doi]
- IoT Database Forensics: An Investigation on HarperDB SecurityRobert Marsh, Sana Belguith, Tooska Dargahi. [doi]
- VANETs Embedded Novel Traffic Management Paradigm for Smart City MilieuSamreen Arshad, Qamar Raza, Majid Hussain. [doi]