Abstract is missing.
- The evolution from Traditional to Intelligent Web Security: Systematic Literature ReviewCarlos Martínez Santander, Hugo Oswaldo Moreno, Myriam Beatriz Hernandez Alvarez. 1-9 [doi]
- Forensic Analysis of the August Smart Device EcosystemShinelle Hutchinson, Umit Karabiyik. 1-7 [doi]
- Transparent Provable Data Possession Scheme for Cloud StorageShinobu Ogiso, Masami Mohri, Yoshiki Shiraishi. 1-5 [doi]
- Fault Tolerance of Multi-Channel Radio Network with Dynamic Spectrum Access Strategy in Air Traffic Management SystemsIgor Kabashkin, Vadim Philippov. 1-6 [doi]
- The SCREAM Concept for the Next-Generation Very Large Array Central Signal ProcessorOmar A. Yeste Ojeda, Nolan Denman, Jacob Wegman, Stephen Wunduke. 1-4 [doi]
- Routing Solutions for Hierarchical MANETsThomas Kunz. 1-6 [doi]
- Millimeter Wave Phased Array Antenna Synthesis Using a Machine Learning Technique for Different 5G ApplicationsShadi Danesh, Ali Araghi, Mohsen Khalily, Pei Xiao, Rahim Tafazolli. 1-5 [doi]
- Towards the Development of a Novel Service Cost Modeling: An ISP PerspectiveYasmeen Ali, Anwar Haque, Bassel Bitar. 1-7 [doi]
- A Thermal Aware Approach to Enhance 5G Device Performance and Reliability in mmWave NetworksAnurag Thantharate, Cory C. Beard, Sreekar Marupaduga. 1-5 [doi]
- Towards a Secure and Efficient Location-based Secret Sharing ProtocolAlexey Gorodetskiy, Andrey E. Serebryakov, Alma Oracevic, Rasheed Hussain, S. M. Ahsan Kazmi. 1-6 [doi]
- Game Theoretic Approach for a Multi-Mode Transportation in Smart CitiesMohammed Bin Hariz, Dhaou Said, Hussein T. Mouftah. 1-6 [doi]
- Recognition of human interactions in feature films based on infinite mixture of EDCMFatma Najar, Nuha Zamzami, Nizar Bouguila. 1-6 [doi]
- A platform for Sharing Artificial Intelligence Algorithms in Autonomous Driving : An overview of Enhanced LAOPJihene Rezgui, Clément Bisaillon, Léonard Oest O'Leary. 1-6 [doi]
- Decentrally-Consented-Server-Based Blockchain System for Universal Types of DataMiraz Uz Zaman, Manki Min. 1-6 [doi]
- Mushroom Demand Prediction Using Machine Learning AlgorithmsMd. Al Maruf, Akramul Azim, Sourojit Mukherjee. 1-6 [doi]
- Comparing OLSRd, d2 and -Q Using an Emulated 802.11 or TDMA MANET in a 2-ring TopologyJean-Frédéric Wagen, Victor Adalid, Yann Maret. 1-5 [doi]
- Multiple Attributes K-Means Clustering for Elastic Cloud ModelTariq Daradkeh, Anjali Agarwal, Yanal Alahmad. 1-6 [doi]
- On the Use of Graph Neural Networks for Virtual Network EmbeddingAnouar Rkhami, Pham Tran Anh Quang, Yassine Hadjadj Aoul, Abdelkader Outtagarts, Gerardo Rubino. 1-6 [doi]
- Modeling LoRa: a Complex Envelope ApproachLuz E. Marquez, Maria Calle, Juan Carlos Velez Diaz. 1-6 [doi]
- A Framework for QoS-based Routing in SDNs Using Deep LearningAmpratwum Isaac Owusu, Amiya Nayak. 1-6 [doi]
- Energy-Efficient Power Allocation for Non-Orthogonal Multicast and Unicast Transmission of Cell-Free Massive MIMO SystemsFangqing Tan, Peiran Wu, Minghua Xia. 1-6 [doi]
- Polymorphic Adversarial DDoS attack on IDS using GANRavi Chauhan, Shahram Shah-Heydari. 1-6 [doi]
- Smartwatch Dynamics: A Novel Modality and Solution to Attacks on Cyber-behavioral Biometrics for Continuous Verification?Khandaker Abir Rahman, Noor Alam, Jarin Musarrat, Anusha Madarapu, Md. Shafaeat Hossain. 1-5 [doi]
- A Non-Cooperative transportation game to optimize resource allocation in edge-cloud environmentNjakarison Menja Randriamasinoro, Kim Khoa Nguyen, Mohamed Cheriet. 1-6 [doi]
- LTE Base Station Congestion Mitigation using Game Theory and Radio Resource Allocation TechniquesAviroop Ghosh, Karina Gomez Chavez, Sithamparanathan Kandeepan. 1-6 [doi]
- External Synchronisation in Time-Triggered NetworksNahman Tariq, Ivan Petrunin, Antonios Tsourdos, Saba Al-Rubaye. 1-7 [doi]
- Machine Learning-based Modelling for Museum Visitations PredictionNorman Yap, Mingwei Gong, Ranesh Kumar Naha, Aniket Mahanti. 1-7 [doi]
- Reconfiguration of LoRa Networks Parameters using Fuzzy C-Means ClusteringAghiles Djoudi, Rafik Zitouni, Nawel Zangar, Laurent George 0001. 1-6 [doi]
- Intelligent Fruit Maturity Assessment Platform Using Convolutional Neural Network: IFMAPJihene Rezgui, Thomas Trépanier, David Génois, Hervé Claden, Amasten Ameziani. 1-6 [doi]
- Incentive-based Peer-to-Peer Distributed Energy Trading in Smart Grid SystemsJema Sharin PankiRaj, Abdulsalam Yassine, Salimur Choudhury. 1-6 [doi]
- An Effective Hybrid Anomaly Detection System Based on Mixture ModelsYogesh Pawar, Nuha Zamzami, Nizar Bouguila. 1-6 [doi]
- Caching Structures for Distributed Data Management in P2P-based Social NetworksNewton Masinde, Moritz Kanzler, Kalman Graffi. 1-8 [doi]
- A data fusion algorithm for clinically relevant anomaly detection in remote health monitoringHugo de Mello Dantas, Claudio Miceli de Farias. 1-8 [doi]
- When Directory Design Meets Data Explosion: Rethinking Query Performance for IoTLuoyao Hao, Henning Schulzrinne. 1-6 [doi]
- DeepFlow: Towards Network-Wide Ingress Traffic Prediction Using Machine Learning At Large ScaleSebastian Fischer, Katerina Katsarou, Oliver Holschke. 1-8 [doi]
- Enabling Real-time Gesture Recognition Data Delivery over ROS and OpenISSJashanjot Singh, Serguei A. Mokhov, Joey Paquet. 1-6 [doi]
- Construction Safety Surveillance Using Machine LearningRuksin Kamal, Ajai John Chemmanam, Bijoy Antony Jose, Sunil Mathews, Eldho Varghese. 1-6 [doi]
- Building a Fintech Ecosystem: Design and Development of a Fintech API GatewayErsin Ünsal, Bilgehan Öztekin, Murat Çavus, Suat Özdemir. 1-5 [doi]
- Terrestrial-Satellite Secure Communication with Non-confidential User Assistance and Hybrid-PowerYilun Liu, Yiheng Gui, Shuai Yuan, Jixuan Liu, Lidong Zhu. 1-6 [doi]
- A Realistic and Efficient Real-time Plant Environment SimulatorJeongwon Seo, Mingwei Gong, Ranesh Kumar Naha, Aniket Mahanti. 1-6 [doi]
- Lightweight cryptographic URLLC for 5G-V2XIqra Mustafa, Ching-Yao Huang. 1-6 [doi]
- The Design of Logging while Drilling's Data Acquisition & Processing System based on High Data Rate Miller codeYao Liang, Xiaodong Ju, Meishan Wang, Peng Liu, Chuanwei Li, Li Ma. 1-5 [doi]
- Programmability of Policy Control at the Edge of the Mobile NetworkEvelina Pencheva, Ivaylo Asenov, Ivaylo Atanasov, D. Ventsislav Trifonov. 1-6 [doi]
- A Pragmatic Cybersecurity Strategies for Combating IoT-CyberattacksAmir Djenna, Diamel-Eddine Saidouni, Wafia Abada. 1-6 [doi]
- AltCC: Alternating Clustering and Classification for Batch Analysis of Malware BehaviorSahar M. Ghanem, Donia Naief Saad Aldeen. 1-6 [doi]
- Analysis of Triple Band Rejected Compact Planar Octagon shape Monopole Antenna for UWB ApplicationsGurdeep Singh, Urvinder Singh. 1-6 [doi]
- Solutions to Data Reception with Improve Blind Source Separation in Satellite CommunicationsChengjie Li, Lidong Zhu, Zhongqiang Luo, Zhen Zhang. 1-5 [doi]
- Privacy Preserving Path Planning in an Adversarial ZoneIman Vakilinia, Mohammad Jafari, Deepak K. Tosh, Shahin Vakilinia. 1-6 [doi]
- Novel highly secure distributed e-mail systemShunki Shinohara, Noriharu Miyaho. 1-4 [doi]
- Machine to Machine Based on Visible Light Communication for IoTsRodrique Chi Fon, Alain Richard Ndjiongue, Khmaies Ouahada. 1-6 [doi]
- Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote AuthenticationMuath Obaidat, Joseph Brown. 1-4 [doi]
- Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access NetworksMarouane Hachimi, Georges Kaddoum, Ghyslain Gagnon, Poulmanogo Illy. 1-5 [doi]
- OpenISS IoT Camera Simulation Environment for Real-time IoT Forensics and Incident ResponseRostislav Axamitnyy, Alexander Aric, Serguei A. Mokhov, Joey Paquet, Sudhir P. Mudur. 1-8 [doi]
- Continuous Authentication Using Creative WritingMd. Shafaeat Hossain, Carl Haberfeld, Kate Yuan, Jundong Chen, Khandaker Abir Rahman, Ishtiaque Hussain. 1-6 [doi]
- Mathematical Modeling and Prediction of Neural Network Training based on RC CircuitsBhaskar Ghosh, Indira Kalyan Dutta, Albert H. Carlson, Michael Totaro. 1-4 [doi]
- The Zenith Scheme: A Novel Modulation Technique for MIMO OFDM Systems with 2D-FFTZhenghao Zhang. 1-4 [doi]
- Unmasking Magnet, a Novel Malware on FacebookMohammad Reza Faghani, Uyen Trang Nguyen. 1-4 [doi]
- Human Trait Analysis via Machine Learning Techniques for User AuthenticationIman I. M. Abu Sulayman, Abdelkader Ouda. 1-10 [doi]
- P-Code Based Classification to Detect Malicious VBA MacroSimon Huneault-Leblanc, Chamseddine Talhi. 1-6 [doi]
- Internet-of-Things (IoT) Shortest Path Algorithms and Communication Case Studies for Maintaining Connectivity in Harsh EnvironementsGhassan Fadlallah, Hamid Mcheick, Djamal Rebaine. 1-8 [doi]
- Piracy on the Internet: Publisher-side Analysis on File Hosting ServicesMarcus Chan, Mingwei Gong, Ranesh Kumar Naha, Aniket Mahanti. 1-7 [doi]
- CP-Less MIMO Discrete Fourier Transform Spread OFDMMd. Mainul Islam Mamun, Deep Medhi, Cory C. Beard. 1-6 [doi]
- Mpls-Based Micro-Mobility Architecture for 5g Vehicular Visible Light Communication NetworksSameera Siddiqui, Dimitrios Makrakis. 1-7 [doi]
- Review of Techniques in Faceted Search ApplicationsMohammed Najah Mahdi, Abdul Rahim Ahmad, Roslan Ismail, Mohammed Subhi. 1-5 [doi]
- Miniaturized Spiral UWB Transparent Wearable Flexible Antenna for Breast Cancer DetectionTale Saeidi, Sarmad Nozad Mahmood, Asnor Juraiza Ishak, Sameer Alani, Shahid M. Ali, Idris Ismail, Adam Reda Hasan Alhawari. 1-6 [doi]
- OpenISS as a Near-Realtime Composable Broadcast Service for Performing Arts and BeyondSerguei A. Mokhov, Jashanjot Singh, Haotao Lai, Konstantinos Psimoulis, Joey Paquet. 1-6 [doi]
- Comparative Performance Analysis of MBQA-OLSRv2 and MBMA-OLSRv2 Routing Protocols in MANETsWaheb A. Jabbar, Roshahliza M. Ramli, Mahamod Ismail. 1-6 [doi]
- Bivariate Beta Regression Model and Its Medical ApplicationsPantea Koochemeshkian, Narges Manouchehri, Nizar Bouguila. 1-5 [doi]
- A New Security Framework for Remote Patient Monitoring DevicesVahid Heydari. 1-4 [doi]
- Resource Allocation for Device-to-Device (D2D) Communications of Uplink Multi-Cell NetworksAmamer Saied, Dongyu Qiu. 1-6 [doi]
- Privacy Preserving Issues in the Dynamic Internet of Things (IoT)Áine MacDermott, John Carr, Qi Shi, Mohd Rizuan Baharon, Gyu Myoung Lee. 1-6 [doi]
- LCA-ABE: Lightweight Context-Aware Encryption for Android ApplicationsSaad Inshi, Rasel Chowdhury, Mahdi Elarbi, Hakima Ould-Slimane, Chamseddine Talhi. 1-6 [doi]
- Detecting Abnormal Traffic in Large-Scale NetworksMahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut. 1-7 [doi]
- On Application of MUSIC Algorithm to Doppler Estimation for Aeronautical Satellite OFDMHoussein Boud, Raveendra K. Rao. 1-6 [doi]
- Improved OFDM Waveform for Radio Link in Non-terrestrial NetworkYang Li, Xinjie Gu, Lilin Dan, Ranran He, Xing Mao, Yue Xiao. 1-6 [doi]
- Recent Advances on 5G Resource Allocation Problem using PD-NOMASally Ismail, Fabio D'Andreagiovanni, Hicham Lakhlef, Youcef Imine. 1-7 [doi]
- Multiple Sequential Constraint Removal Algorithm For Channel Estimation In Vehicular EnvironmentSoheyb Ribouh, Yassin Elhillali, Atika Rivenq. 1-7 [doi]
- Proportionally Fair approach for Tor's Circuits SchedulingLamiaa Basyoni, Aiman Erbad, Amr Mohamed, Ahmed Refaey, Mohsen Guizani. 1-6 [doi]
- Performance of Cell-Free Systems in Generalized Fading ChannelsDanilo Brito Teixeira de Almeida, Marcelo Sampaio de Alencar, Wamberto José Lira de Queiroz, Rafael Moura Duarte, Waslon Terllizzie Araujo Lopes, Hugerles Sales Silva. 1-5 [doi]
- Botnets and their detection techniquesAhmed Shafee. 1-6 [doi]
- Triple Cassegrain Parabolic Stacked Antenna for Radio Frequency System ConsolidationClive Sugama, V. Chandrasekar. 1-4 [doi]
- Performance Evaluation of Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area EstimationYogesh Pawar, Manar Amayri, Nizar Bouguila. 1-6 [doi]
- Opening the Network Edge for Programmability of Mission Critical Session ControlIvaylo Atanasov, Evelina Pencheva, Denitsa Velkova, Ventsislav G. Trifonov. 1-6 [doi]
- The Security Ingredients for Correct and Byzantine Fault-tolerant Blockchain Consensus AlgorithmsAmani Altarawneh, Anthony Skjellum. 1-9 [doi]
- Enabling an efficient satellite-terrestrial hybrid transport service through a QUIC-based proxy functionMichele Luglio, Mattia Quadrini, Simon Pietro Romano, Cesare Roseti, Francesco Zampognaro. 1-6 [doi]
- Smart Wireless network for data collection using mobile Sink embedded on drone based on a modified RPL-versionSèmèvo Arnaud R. M. Ahouandjinou, Emmanuel Nataf, Aldric Monnou, Frimin Yelouassi. 1-6 [doi]
- Full Duplex of V2V Cooperative Relaying over Cascaded Nakagami-m Fading ChannelsKhaled M. Eshteiwi, Bassant Sleim, Georges Kaddoum. 1-5 [doi]
- A New Approach for Analyzing the Cycle Structure of a Class of LFSRsZhelin Yu, Lidong Zhu. 1-6 [doi]
- Automating GDPR Compliance Verification for Cloud-hosted ServicesMasoud Barati, George Theodorakopoulos 0001, Omer Rana. 1-6 [doi]
- Vulnerabilities Assessment for Unmanned Aerial Vehicles Communication SystemsLamia Chaari, Sana Chahbani, Jihene Rezgui. 1-6 [doi]
- Distance Aware Radio Planning for SDN Based 5G-Satellite NetworkMarwen Abdennebi, Nawel Zangar, Saloua Hendaoui. 1-7 [doi]
- Performance Analysis of Cooperative Bidirectional Relay in Cognitive Radio Network with Energy HarvestingKe Yan, Xian-Zhong Xie. 1-6 [doi]
- Cluster Analysis of Passive DNS Features for Identifying Domain Shadowing InfrastructureNolan H. Hamilton, Eddie Allan, Errin W. Fulp. 1-4 [doi]
- Joint Impact of BS Height and Downtilt on Downlink Data Rate in mmWave Networks with 3D Large-Scale Antenna ArraysMengxin Zhou, WuLing Liu, Jiliang Zhang 0001, Xiaoli Chu. 1-5 [doi]
- Optimizing Virtual Machine Migration in Multi-CloudsA. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine. 1-7 [doi]
- Secrecy Performance of AF/DF relaying in NOMA Systems using Average and Instantaneous Channel gain for users' rankingNesrine Zaghdoud, Adel Ben Mnaouer, Wided Hadj Alouane, Hatem Boujemaa, Farid Touati. 1-7 [doi]
- Towards IoT Slicing for Centralized WLANs in Enterprise NetworksForoutan Fami, Chuan Pham, Kim Khoa Nguyen. 1-6 [doi]
- Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless ChargingKhaled Hamouid, Kamel Adi. 1-6 [doi]
- Virtual Cut-Through Routing in Multidimensional Interconnection NetworksLev B. Levitin, Yelena Rykalova. 1-6 [doi]
- Using Execution Profiles to Identify Process Behavior ClassesArnav Bhandari, Katherine Juarez, Errin W. Fulp. 1-4 [doi]
- Resource Management Based on Reinforcement Learning for D2D Communication in Cellular NetworksAmamer Saied, Dongyu Qiu, Mahmoud Swessi. 1-6 [doi]
- An IoT Based Smart Farming System Using Machine LearningAmine Dahane, R. Benameur, Kechar Bouabdellah, A. Benyamina. 1-6 [doi]
- A Machine-Learning based Approach to Support Academic Decision-Making at Higher Educational InstitutionsMuhib Al-kmali, Hamzah Mugahed, Wadii Boulila, Mohammed Al-Sarem, Anmar Abuhamdah. 1-5 [doi]
- The Visual Quality of Teleoperated Driving Scenarios How good is good enough?Stefan Neumeier, Simon Stapf, Christian Facchi. 1-8 [doi]
- Joint Placement Latency Optimization of the Control PlaneKurdman Abdulrahman Rasol Rasol, Jordi Domingo-Pascual. 1-6 [doi]
- Green Crowdsensing by Learning Inter-Auction Mappings and Non-local Graph ConstraintsMaggie Ezzat Gaber Gendy, Ahmad Al-Kabbany, Ehab Farouk Badran. 1-4 [doi]
- Truth Prediction by Weakly Connected Agents in Social Networks Using Online LearningOlusola Tolulope Odeyomi. 1-5 [doi]
- A Decentralized Tree-based Algorithm for Reliable Blockchain CommunicationsChih-Hao Lin, Wen-Yuan Chen, Ping-Sheng Lin. 1-6 [doi]
- Optimized Application Driven Scheduling for Clustered WSNHossein Amirinia, Ramiro Liscano. 1-6 [doi]
- Outage Probability of a CSK Transmission in Visible Light Communications SystemsAlain Richard Ndjiongue, Telex Magloire Nkouatchah Ngatched. 1-6 [doi]
- Analytics Automation for Service OrchestrationRavi Potluri, Kristen Young. 1-4 [doi]
- Exponentially Distributed Random Access in LTE-A networksRashid Ali 0001, Zulqarnain, Sung Won Kim, Hyung Seok Kim. 1-5 [doi]
- Information security risk assessment based on decomposition probability via Bayesian NetworkPavel Yermalovich, Mohamed Mejri. 1-8 [doi]
- Congestion Aware Data Collection with Mobile Sinks in Smart CityFairouz Chehbour, Zouina Doukha, Samira Moussaoui, Mohamed Guerroumi. 1-7 [doi]
- Risk-based Trust Evaluation Model for VANETsRasha Jamal Atwah, Paola Flocchini, Amiya Nayak. 1-6 [doi]
- Analysis of Blockage Impact on Handover Rate for User with Mobility in 5G mm-Wave Cellular NetworkAbdanaser Okaf, Dongyu Qiu. 1-6 [doi]
- Asynchronous Forensic Investigative Approach to Recover Deleted Data from Instant Messaging ApplicationsFahad E. Salamh, Umit Karabiyik, Marcus K. Rogers. 1-6 [doi]
- Utility Analysis of Horizontally Merged Multi-Party Synthetic Data with Differential PrivacyBingyue Su, Fang Liu. 1-7 [doi]
- Automation System for Six-minute Walk Test Using RFID TechnologyVinícius Oliveira, Lucas Duarte, Gabriel Costa, Marcielly Macêdo, Tagleorge Silveira. 1-6 [doi]
- Analysis of Interference Mitigation between Earth Station - High Throughput Satellite towards 5G Terrestrial Network in 28 GHz Co-channel FrequencyAnna Christina Situmorang, Nico Febry Yoshua, Dadang Gunawan. 1-5 [doi]
- Searching for Optimal Software Defined Network Controller Against DDoS AttacksBranislav Mladenov, Georgi Iliev. 1-4 [doi]
- Artificial Noise-aided Spatial and Directional Modulation Systems for Secure TransmissionHongyan Zhang 0006, Yue Xiao, Bin Fu, Xiaotian Zhou. 1-5 [doi]
- A Collision Avoiding Packet Scheduling and Energy-Efficient Routing Technique for Video Wireless Sensor NetworksNouman Bashir, Saadi Boudjit. 1-6 [doi]
- Leveraging Deep Learning for Inattentive Driving Behavior with In-Vehicle CamerasShanhong Liu, Radu Muresan, Arafat Al-Dweik. 1-6 [doi]
- A Fair VNF Assignment Algorithm for Network Functions VirtualizationKaranbir Singh Ghai, Abdulsalam Yassine, Salimur Choudhury. 1-6 [doi]
- Proactive and Dynamic Slice Allocation in Sliced 5G Core NetworksDanish Sattar, Ashraf Matrawy. 1-8 [doi]
- Peers Classification and Monitoring in a P2P SystemFatima Lamia Haddi, Mahfoud Benchaïba, Jihene Rezgui, Tarek Bejaoui. 1-6 [doi]
- Toward Scalable Demand-Driven JSON-to-Forensic Lucid Encoder in GIPSYPeyman Derafshkavian, Simon Huneault-Leblanc, Sacha Renault-Crispo, Akansha Marwaha, Serguei A. Mokhov, Joey Paquet. 1-6 [doi]
- Resource efficient allocation of fog nodes for faster vehicular OTA updatesMd. Al Maruf, Anil Singh, Akramul Azim, Nitin Auluck. 1-6 [doi]
- Intelligent Frames for occupants safety in AutomobilesSatyam Pandey, Manoj Prem Siddaiah Mahadevaiah, Vipul Shrikant Deshpande. 1-8 [doi]
- Probabilistic Features on Simplex Manifold in Predictive Data ModellingMd. Hafizur Rahman, Nizar Bouguila. 1-6 [doi]
- Reconfigurable Dielectric Resonator Antenna Using an Inverted U-shaped SlotMohammad Abediankasgari, Mohsen Khalily, Shadi Danesh, Pei Xiao, Rahim Tafazolli. 1-5 [doi]
- A Lightweight Deep Neural Model for SMS Spam DetectionFeng Wei 0002, Uyen Trang Nguyen. 1-6 [doi]
- An Optimization Approach to Graph Partitioning for Detecting Persistent Attacks in Enterprise NetworksHazem M. Soliman. 1-6 [doi]
- Frequency Selective CMOS RF-to-DC Rectifier for Wireless Power and RFID ApplicationsNima Souzandeh, Mansoor Dashti Ardakani, Sonia Aïssa, Serioja Ovidiu Tatu. 1-6 [doi]
- Designing Security User Profiles via Anomaly Detection for User AuthenticationIman I. M. Abu Sulayman, Abdelkader Ouda. 1-6 [doi]
- Secure Hybrid Analog and Digital Precoding for Massive MIMO SystemsShan Luan, Yan Zhang, Hongyan Zhang 0006, Yanping Xiao, Yue Xiao, Bin Fu. 1-5 [doi]
- Cost and Availability-Aware VNF Selection and Placement for Network Services in NFVYanal Alahmad, Anjali Agarwal, Tariq Daradkeh. 1-6 [doi]
- PubChain: A Decentralized Open-Access Publication Platform with Participants Incentivized by Blockchain TechnologyTaotao Wang, Soung Chang Liew, Shengli Zhang. 1-8 [doi]
- A Web Client Perspective on IP Geolocation AccuracyJoel Sommers. 1-8 [doi]
- Bayesian Joint Synchronization and Localization Based on Asymmetric Time-stamp ExchangeMeysam Goodarzi, Nebojsa Maletic, Jesús Gutiérrez 0004, Eckhard Grass. 1-7 [doi]
- Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy BlockchainManas Pratim Bhattacharya, Pavol Zavarsky, Sergey Butakov. 1-7 [doi]
- Time Synchronization in IoT Mesh NetworksTibor Beke, Esko Dijk, Tanir Ozcelebi, Richard Verhoeven. 1-8 [doi]
- Seizure Prediction with a Single iEEG Electrode Using Non-linear TechniquesTahar Haddad, Naim Ben Hamida, Sadok Aouini, Jihene Rezgui. 1-6 [doi]
- Diffuse Scattering and Specular Reflection from Facets of Arbitrary Size and Roughness using the Computer Graphics GGX ModelJean-Frédéric Wagen. 1-5 [doi]
- Resource Pre-allocation for Cooperative Sensing to Achieve End-to-end Delay Fairness in CRNsYean-Fu Wen. 1-6 [doi]
- Decentralized and Privacy-Preserving Key Management ModelReza Soltani, Uyen Trang Nguyen, Aijun An. 1-7 [doi]
- LED-based Energy Harvesting Systems for Modern Mobile TerminalsAlain Richard Ndjiongue, Telex Magloire Nkouatchah Ngatched. 1-6 [doi]
- AI and machine learning: A mixed blessing for cybersecurityFaouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, Thar Baker. 1-7 [doi]
- A Framework for Automated Monitoring and Orchestration of Cloud-Native applicationsRasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad. 1-6 [doi]
- Vulnerable Road Users Detection based on Convolutional Neural NetworksAbdelhamid Mammeri, Abdul Jabbar Siddiqui, Yiheng Zhao, Barry R. Pekilis. 1-6 [doi]
- Capacity Heat Maps for Millimeter WavesGabriela Sobreira de Carvalho, Marcelo Sampaio de Alencar, Raíssa Bezerra Rocha. 1-4 [doi]
- Development of Real-Time Smart City Mapping Utilizing Game EnginesTucker Clark, Evan Brock, Dalei Wu, Yu Liang. 1-6 [doi]
- Autonomous Learning Intelligent Vehicles Engineering: ALIVE 1.0Jihene Rezgui, Émile Gagné, Guillaume Blain. 1-6 [doi]
- Failure Scenarios for SIP/RTP services in Container Orchestration ClustersSamridhi, Ramiro Liscano, Akramul Azim, Abdul Zainul Abedin, Brian Pulito, Yee-Kang Chang. 1-6 [doi]
- BlockHR - A Blockchain-based Healthcare Records Management Framework: Performance Evaluation and Comparison with Client/Server ArchitectureLeila Ismail, Huned Materwala, Youssef Sharaf. 1-8 [doi]
- Security Analysis of IoT Networks and PlatformsStephen Ugwuanyi, James Irvine. 1-6 [doi]
- Cognitive CQI/5QI Based Scheme for Software Defined 5G Hybrid Satellite-Terrestrial Network: Slicing for Ultra Reliability And Video Congestion OffloadingSaloua Hendaoui, Aza Mannai, Nawel Zangar. 1-7 [doi]
- Multiuser Visible Light Communication System using Hybrid OFDM-PWMAffan Affan, Usama Khan, Hafiz Muhammad Asif, Kammran Raahemifar. 1-6 [doi]
- Congestion Mitigation using Non-Cooperative Game Theory in LTE Base StationsAviroop Ghosh, Karina Gomez Chavez, Sithamparanathan Kandeepan. 1-6 [doi]
- Proactive Disturbance-Aware Routing within Software-Defined NetworkingAhmad Abdo, Khaled Maamoun, Claude D'Amours, Hussein T. Mouftah. 1-5 [doi]
- Real-Time Tracking of Aircrafts in Crowdsourced Air Traffic Networks with Simple Localization EstimatesAbderazek Chaka Bannour, Rim Moussa, Tarek Bejaoui. 1-6 [doi]
- Submarine Antenna Performance with Novel Shaped Sandwich-Wall RadomeHafiz Usman Tahseen, Lixia Yang, Saad Uddin. 1-6 [doi]
- Resilience Improvements for Space-Based Radio Frequency Machine LearningLauren J. Wong, Emily Altland, Joshua Detwiler, Paolo Fermin, Julia Mahon Kuzin, Nathan Moeliono, Abdelrahman Said Abdalla, William C. Headley, Alan J. Michaels. 1-5 [doi]
- Improving Accuracy of Differentially Private Kronecker Social Networks via Graph ClusteringArinjita Paul, Vorapong Suppakitpaisarn, Mitali Bafna, C. Pandu Rangan. 1-6 [doi]
- Dashboard Visualization Techniques in Information SecurityPavel Yermalovich. 1-6 [doi]
- Multiple UAV based Spatio-Temporal Task Assignment using Fast Elitist Multi Objective Evolutionary ApproachesKabo Elliot Pule, Mohammad Hossein Anisi, Faiyaz Doctor, Hani Hagras. 1-8 [doi]
- IoT-based Home Automation Using Android ApplicationAmna Eleyan, Joshua Fallon. 1-4 [doi]
- Narrow-band Internet of Things Protocol Standards: Survey of Security and Privacy Control EffectivenessEric Yocam. 1-6 [doi]
- Improving WebRTC Security via Blockchain Based Smart ContractsBerat Yilmaz, Ertugrul Barak, Suat Ozdemir. 1-6 [doi]
- Low-power Concepts for FPGAs in Applications with limited Energy ResourcesKarol Niewiadomski, Dietmar Tutsch. 1-8 [doi]
- A Different Perspective in Routing for VANETsYuri Cotrado Sehgelmeble, Stefan Fischer. 1-4 [doi]
- A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy ZoneYong Jin, Masahiko Tomoishi, Nariyoshi Yamai. 1-6 [doi]
- Performance of Mixed Channel Cell-Free SystemsRafael Moura Duarte, Marcelo Sampaio de Alencar, Wamberto José Lira de Queiroz, Danilo Brito Teixeira de Almeida, Fabrício Braga Soares de Carvalho, Waslon Terllizzie Araujo Lopes. 1-5 [doi]
- On Evaluating Independent Set Heuristics for Wireless Backhaul Network Capacity of 5G Ultra-Dense NetworksAizaz U. Chaudhry, Namitha Jacob, Dils George, Roshdy H. M. Hafez. 1-6 [doi]
- Performance comparison of a Software Defined and Wireless Sensor NetworkSamridhi Samridhi, Ramiro Liscano. 1-6 [doi]
- Empirical Comparison of Machine Learning Algorithms for Mitigating Power Systems Intrusion AttacksOyeniyi Akeem Alimi, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Kuburat Oyeranti Adefemi Alimi. 1-5 [doi]
- NB-IoT Testbed for Industrial Internet of ThingsStephen Ugwuanyi, Jidapa Hansawangkit, James Irvine. 1-6 [doi]
- Towards a Decentralized Access Control System for IoT Platforms based on Blockchain TechnologyDana Haj Hussein, Ragunath Anbarasu, Ashraf Matrawy, Mohamed Ibnkahla. 1-6 [doi]
- Prototype Development of Face and Speaker Recognitions based on Edge ComputingYuxuan Pan, Xiaowen Peng, Xuexian Lin, Minghua Xia. 1-5 [doi]
- Using Machine Learning to Locate Gateways in the Wireless Backhaul of 5G Ultra-Dense NetworksAizaz U. Chaudhry, Mital Raithatha, Roshdy H. M. Hafez, John W. Chinneck. 1-5 [doi]
- Achieving Immortality in Wireless Rechargeable Sensor Networks Using Local LearningOsama I. Aloqaily, Paola Flocchini, Nicola Santoro. 1-6 [doi]
- PMBFE: Efficient and Privacy-Preserving Monitoring and Billing Using Functional Encryption for AMI NetworksMohamed I. Ibrahem, Mahmoud M. Badr, Mostafa M. Fouda, Mohamed Mahmoud 0001, Waleed Alasmary, Zubair Md. Fadlullah. 1-7 [doi]
- Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSsRana Abou Khamis, Ashraf Matrawy. 1-6 [doi]