Abstract is missing.
- A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural NetworkBipraneel Roy, Hon Cheung. 1-6 [doi]
- Situational and Adaptive Context-Aware Routing for Opportunistic IoT NetworksJaime Galán-Jiménez, Javier Berrocal, José García-Alonso, Carlos Canal, Juan Manuel Murillo. 1-6 [doi]
- Comparison of Two Sharing Modes for a Proposed Optical Enterprise-Access SDN ArchitectureXiaoyu Wang, Xiao Lin, Weiqiang Sun, Malathi Veeraraghavan. 1-8 [doi]
- Optimization of LED Layout to Improve Uniformity of Illumination and SNR for Indoor Visible Light CommunicationQuanrun Chen, Tao Zhang, Weibo Zheng. 1-3 [doi]
- HIDTN: Hybrid DTN and Infrastructure Networks for Reliable and Efficient Data DisseminationYasser Mawad, Stefan Fischer 0001. 1-8 [doi]
- Iterative Decision-Directed Receiver for the Mitigation of Side-Effect Modulation in indoor VLC applicationsMohammed M. A. Mohammed, Cuiwei He, Jean Armstrong. 1-6 [doi]
- Joint Mode Selection and Resource Allocation for Relay-Assisted Device-to-Device NetworksNarayut Putjaika, Phond Phunchongharn, Khajonpong Akkarajitsakul, Unchalisa Taetragool. 1-6 [doi]
- Four Single-Sideband M-QAM Modulation using Soft Input Soft Output Equalizer over OFDMAlhasani M. Mustafa, Quang Ngoc Nguyen, Takuro Sato, Gen-ichiro Ohta. 1-6 [doi]
- Experiments and Proofs in Web-service SecurityDawood Sheniar, Nabeel Hadaad, David Martin, Ron Addie, Shahab A. Abdullah. 1-6 [doi]
- Towards an Active Probing Extension for the ONOS SDN ControllerChristopher Metter, Valentin Burger, Zheng Hu, Ke Pei, Florian Wamser. 1-8 [doi]
- Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion DetectionAnthony Dobson, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu. 1-6 [doi]
- Virtualized oneM2M System Architecture in Smart Factory EnvironmentsChangyong Um, Jaehyeong Lee, Jongpil Jeong. 1-6 [doi]
- Power Allocation and Outage Analysis for Cognitive Radio with Jamming Signal under Primary Secrecy Outage ConstraintDae-Kyo Jeong, Dongwoo Kim. 1-6 [doi]
- Towards Prediction of Power Consumption of Virtual Machines for Varying LoadsHumaira Abdul Salam, Franco Davoli, Alessandro Carrega, Andreas Timm-Giel. 1-6 [doi]
- PEGADyn: A Cluster-Based Energy Efficient Routing Protocol for Ad Hoc NetworksVinojitha Raghavan, David Airehrour, Emmanuel Ndashimye, Abdullahi B. Baffa. 1-6 [doi]
- A Multi-agent Controller to enable Cognition in Software Defined NetworksVijaya Durga Chemalamarri, Robin Braun, Justin Lipman, Mehran Abolhasan. 1-5 [doi]
- Radio-Frequency Emitter Localisation Using a Swarm of Search AgentsBradley Fraser. 1-6 [doi]
- Cloud Enabled Solution for Privacy Concerns in Internet of Medical ThingsR. M. P. H. K. Rathnayake, M. Sajeewani Karunarathne, Nazmus Shaker Nafi, Mark A. Gregory. 1-4 [doi]
- Feature-Selection based PMU Placement for Detection of Faults in Power GridsRana Al Halaseh, Halil Alper Tokel, Subhodeep Chakraborty, Gholamreza Alirezaei, Rudolf Mathar. 1-6 [doi]
- Are Internet Tunnels Worthwhile?Habiba Akter, Chris Phillips. 1-6 [doi]
- Energy-Aware Adaptive Trickle Timer Algorithm for RPL-based Routing in the Internet of ThingsArslan Musaddiq, Yousaf Bin Zikria, Sung Won Kim. 1-6 [doi]
- Evaluating the Performance of QoI Algorithms in Realistic MANETsAmeer Shakayb Arsalaan, Hung Nguyen, Andrew Coyle. 1-6 [doi]
- Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge ComputingAyub Bokani, Jahan Hassan, Salil S. Kanhere. 1-6 [doi]
- Security network policy enforcement through a SDN frameworkDavide Berardi, Franco Callegati, Andrea Melis, Marco Prandini. 1-4 [doi]
- Data Ferry Flocking for Bulk Information Transfer Under Ferry Buffer ConstraintsBradley Fraser. 1-6 [doi]
- New Framework for analysis Of Energy Efficiency in massive MIMO With Hardware ImpairmentsTalha Younas, Jiandong Li 0001, Jehangir Arshad Meo, Muluneh Mekonnen Tulu, Hafiz Mudassir Munir. 1-3 [doi]
- On the Error Rate Analysis of Distributed Transmit BeamformingIshtiaq Ahmad, Gottfried Lechner, Ismail Shakeel. 1-4 [doi]
- Clustering-based Handover and Resource Allocation Schemes for Cognitive Radio Heterogeneous NetworksShahriar Shirvani Moghaddam, Mahyar Shirvanimoghaddam, Ameneh Habibzadeh. 1-6 [doi]
- Comparative study of classification techniques for indoor localization of mobile devicesKamran Zia, Hifsa Iram, Muhammad Aziz Ul Haq, Aasim Zia. 1-5 [doi]
- Bit Rate and Task Scheduling in Cloud Computing for Multimedia Big DataByeongok Choi, Chae Y. Lee. 1-5 [doi]
- A Study on Fiber-Optic Relaying Scheme Using Spatial Modulation for MIMO TransmissionsIkuya Kitamura, Hong Zhou, Kazuo Kumamoto, Fengping Yan. 1-4 [doi]
- Analysis of Interference Mitigation in Heterogeneous Cellular Networks using Soft Frequency Reuse and Load BalancingMuhammad Sajid Haroon, Ziaul Haq Abbas, Ghulam Abbas, Fazal Muhammad. 1-6 [doi]
- R2Lab Testbed Evaluation for Wireless Mesh Network ExperimentsFarzaneh Pakzad, Marius Portmann, Thierry Turletti, Thierry Parmentelat, Mohamed Naoufal Mahfoudi, Walid Dabbous. 1-6 [doi]
- A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data CenterQuentin Schueller, Kashinath Basu, Muhammad Younas 0001, Mohit Patel, Frank Ball. 1-6 [doi]
- Blockchain in IoT Security: A SurveyFahad Alkurdi, Ibrahim Elgendi, Kumudu S. Munasinghe, Dharmendra Sharma, Abbas Jamalipour. 1-4 [doi]
- Advances in microwave photonic signal processing for 5G and IoT Keynote PaperRobert A. Minasian. 1-4 [doi]
- Channel-based Rate Selection for Commodity RFID NetworksJiajia Guo, Caidong Gu, Si Chen, Hongwei Du, Xiaoxiao Wang, Jihong Yu, Wei Gong. 1-6 [doi]
- Rescue Mission Enhancement through Ambulance-to- Vehicle CommunicationsChakkaphong Suthaputchakun, Yue Cao. 1-6 [doi]
- A Reinforcement Learning Based User Association Algorithm for UAV NetworksQingzhi Li, Ming Ding, Chuan Ma, Chang Liu, Zihuai Lin, Ying-Chang Liang. 1-6 [doi]
- Multi-domain Software Defined Network ProvisioningFranciscus X. A. Wibowo, Mark A. Gregory. 1-7 [doi]
- AIS Reputation Mechanism in MANETLincy Elizebeth Jim, Mark A. Gregory. 1-6 [doi]
- Towards information modeling for a QoS-aware support in the lifecycle of virtual networksGladys Diaz, Michelle Sibilla, Noemie Simoni. 1-6 [doi]
- A New Result on Rearrangeable 3-Stage Clos NetworksSatoru Ohta. 1-6 [doi]
- An Enhanced K-means Clustering Algorithm with Non-Orthogonal Multiple Access (NOMA) for MMC NetworksEmerson Cabrera, Rein Vesilo. 1-8 [doi]
- Implementation and Performance Analysis of Power and Cost-Reduced OPC UA Gateway for Industrial IoT PlatformsHanjun Cho, Jongpil Jeong. 1-3 [doi]
- A Test-bed for Studies of Temporal Data Delivery Issues in a TPCAST Wireless Virtual Reality Set-upViktor Kelkkanen, Markus Fiedler. 1-3 [doi]
- Sleep-based Resource Allocation Algorithm for Inter-Femto Interference MitigationWeilong Ren, Letian Li, Yanjun Yao, Chenchen Liu, Shuo Wang. 1-6 [doi]
- Integrating Routing Schemes and Platform Autonomy Algorithms for UAV Ad-hoc & Infrastructure based networksOgbonnaya Anicho, Philip B. Charlesworth, Gurvinder Baicher, Atulya Nagar. 1-5 [doi]
- Enabling Energy Efficient Data FerryingHongjun Yu, Cheng-Chew Lim, Robert Hunjet. 1-6 [doi]
- Beam Detection Analysis for 5G mmWave Initial AcquisitionMahbuba Sheba Ullah, Ahmed H. Tewfik. 1-8 [doi]
- Performance Analysis of Polling Mechanism in WBANKhalid Hasan, Khandakar Ahmed, Kamanashis Biswas. 1-4 [doi]
- Security threat probability computation using Markov Chain and Common Vulnerability Scoring SystemNgoc T. Le, Doan B. Hoang. 1-6 [doi]
- Wi-Fi Based Device-free Microwave Ghost Imaging Indoor Surveillance SystemRuichen Luo, Ziqian Zhang, Xiaopeng Wang, Zihuai Lin. 1-6 [doi]
- Comparison of learning techniques for prediction of customer churn in telecommunicationManpreet Singh, Sarbjeet Singh, Nadesh Seen, Sakshi Kaushal, Harish Kumar. 1-5 [doi]
- Coefficient of Throughput Variation as Indication of Playback Freezes in Streamed Omnidirectional VideosViktor Kelkkanen, Markus Fiedler. 1-6 [doi]
- Redundancy Management for Safety-Critical Applications with Time Sensitive NetworkingMaryam Pahlevan, Roman Obermaisser. 1-7 [doi]
- A Scalable and Efficient PKI Based Authentication Protocol for VANETsMiraj Asghar, Robin Ram Mohan Doss, Lei Pan. 1-3 [doi]
- Prediction of Personalised Life Expectancy using Personal Health Devices in mHealth NetworksJames Jin Kang. 1-5 [doi]
- Energy-Detection performance for SIMO Cognitive Radio Systems with Selection Combining over κ -μ Shadowed Fading ChannelsMohammed S. Aloqlah, Reem A. Alzubaidi. 1-6 [doi]
- Blockchain-Based Implementation for Financial Product ManagementBihuan Chen, Zhixiong Tan, Wei Fang. 1-3 [doi]
- RF Energy Harvesting and Information Transmission in IoT Relay Systems based on Time Switching and NOMAAshish Rauniyar, Paal Engelstad, Olav N. Østerbø. 1-7 [doi]
- Performance Analysis of Energy Harvesting based Two-way Multi-Relay Wireless NetworkSupreet Singh. 1-6 [doi]
- Multiple Intermittent Controllers for IoT Home AutomationTyler Nicholas Edward Steane, Peter J. Radcliffe. 1-6 [doi]
- S-MANAGE Protocol For Software-Defined IoTThi Minh Chau Nguyen, Doan B. Hoang. 1-6 [doi]
- Analysis of the effects of multiple reflection paths on high speed VLC system performanceM. T. Rahman, Masuduzzaman Bakaul, Rajendran Parthiban. 1-6 [doi]
- Enhancing Quality of Experience of VoIP Traffic in SDN based End-hostsAnees Al-Najjar, Siamak Layeghy, Marius Portmann, Jadwiga Indulska. 1-8 [doi]
- Detection of Primary User Emulation Attack in Sensor NetworksMasud Rana, Mazed Rayhan Shuvo. 1-6 [doi]
- Towards a viable business model for collaborative use of unlicensed frequency bands in densely populated areasFrank den Hartog, Koen Dittrich, Jan de Nijs. 1-6 [doi]
- Towards SDN Fault Tolerance using Petri-NetsWael Hosny Fouad Aly, Yehia Kotb. 1-3 [doi]
- An Integrated mHealth and Vehicular Sensor Based Alarm System Emergency Alarm Notification System for Long Distance Drivers using Smart Devices and Cloud NetworksJames Jin Kang, Sitalakshmi Venkatraman. 1-6 [doi]
- Comparision of pathfinding algorithms for visually impaired people in IoT based smart buildingsPayal Tusharkumar Mahida, Seyed A. Shahrestani, Hon Cheung. 1-3 [doi]
- Performance Comparison of WhatsApp versus Skype on Smart PhonesNayankumar Patel, Swapnil Patel, Wee Lum Tan. 1-3 [doi]
- Cloud Applications Consolidation through Context Information and Heuristic optimizationAlessandro Carrega, Matteo Repetto. 1-7 [doi]
- Experimental Evaluation of LoRaWAN in NS-3Furqan Hameed Khan, Marius Portmann. 1-8 [doi]
- Dynamic Vehicular Traffic Load Quantification by Considering Intermittent Unused Road SpaceGerald Ostermayer, Christian Backfrieder, Manuel Lindorfer. 1-8 [doi]
- Collaborative Neighbor Discovery with Slow Scan for Directional Sensor NetworksNipun Sood, Shamanth Nagaraju, V. Sreejith, Lucy J. Gudino. 1-3 [doi]
- LSTM for Anomaly-Based Network Intrusion DetectionSara A. Althubiti, Eric Marcell Jones, Kaushik Roy. 1-3 [doi]
- Joint Design of Relay-User Selection in Direct-link Energy Harvesting Relay NetworksChenchen Liu, Jing Zhao, Jiaxi Zhou, Zhengyu Zhang, Weilong Ren. 1-4 [doi]
- Outage Capacity Analysis for Ambient Backscatter Communication SystemsSiwen Xing, Ming Ding, Zihuai Lin. 1-6 [doi]
- Proximity Coordinated Random Access (PCRA) for M2M Applications in LTE-AJason Brown, Jamil Y. Khan. 1-3 [doi]
- NC-MapCast: Network Coding based Multi-Attribute Profile-Cast in Mobile Opportunistic NetworksDi Zhang, Huadong Ma, Dong Zhao 0001, Lei Kuang. 1-6 [doi]
- CamThings: IoT Camera with Energy-Efficient Communication by Edge Computing based on Deep LearningJaebong Lim, Juhee Seo, Yunju Baek. 1-6 [doi]
- Towards an Unified Multi-service Ethernet Transport Network(ETN)Qichang Chen, Rixin Li, Hongbiao Zhang, Shuai Xiao, Qiwen Zhong, Desheng Sun, Lehong Niu, Li Ding, Sen Zhang. 1-6 [doi]
- On Emptying Small Satellite Networks with In-Network Data AggregationLuyao Wang, Kwan-Wu Chin. 1-8 [doi]
- Context-Aware and Energy-Efficient Protocol for the Distributed Wireless Sensor NetworksDa-Ren Chen, Ming-Yang Hsu, Hao-Yen Chang. 1-6 [doi]
- Context-Aware Mobile Edge Computing in Vehicular Ad-Hoc NetworksZachary W. Lamb, Dharma P. Agrawal. 1-7 [doi]