Abstract is missing.
- A Framework for Security Enhancement in SDN-Based DatacentersMoustafa Ammar, Mohamed Rizk, Ayman Abdel-Hamid, Ahmed K. Aboul-Seoud. 1-4 [doi]
- Magec: An Image Searching Tool for Detecting Forged Images in Forensic InvestigationSultan Al Sharif, Mohamed Al Ali, N. Al Reqabi, Farkhund Iqbal, T. Baker, Andrew Marrington. 1-6 [doi]
- Achieving Intelligent Traffic-Aware Consolidation of Virtual Machines in a Data Center Using Learning AutomataAkaki Jobava, Anis Yazidi, B. John Oommen, Kyrre M. Begnum. 1-5 [doi]
- The Risk-Utility Tradeoff for Data Privacy ModelsMohammad Moein Almasi, Taha R. Siddiqui, Noman Mohammed, Hadi Hemmati. 1-5 [doi]
- Adaptive Security Framework for Resource-Constrained Internet-of-Things PlatformsEnrico Ferrera, Rosaria Rossini, Davide Conzon, Sandro Tassone, Claudio Pastrone. 1-5 [doi]
- JTAG Combined Attack - Another Approach for Fault InjectionFabien Majeric, Benoit Gonzalvo, Lilian Bossuet. 1-5 [doi]
- Scalable Processing in 5G Cloud-RAN Networks Using MapReduce FrameworkAli M. Mahmood, Adil Al-Yasiri. 1-6 [doi]
- Performance Evaluation of a Hybrid Paging Mechanism to Support Locator Identity Split End-Host MobilityAvinash Mungur, Muhammad Tuhaloo, Muzaffar Jawarun. 1-5 [doi]
- HAMA: A Herd-Movement Adaptive MAC Protocol for Wireless Sensor NetworksEyuel D. Ayele, Nirvana Meratnia, Paul J. M. Havinga. 1-7 [doi]
- WSNs Self-Calibration Approach for Smart City Applications Leveraging Incremental Machine Learning TechniquesRosaria Rossini, Enrico Ferrera, Davide Conzon, Claudio Pastrone. 1-7 [doi]
- Supporting the IoT over Integrated Satellite-Terrestrial Networks Using Information-Centric NetworkingVasilios A. Siris, Yannis Thomas, George C. Polyzos. 1-5 [doi]
- Applying and Comparing Two Measurement Approaches for the Estimation of Indoor WiFi CoverageJouni Tervonen, Markku Hartikainen, Marjo Heikkilä, Marjut Koskela. 1-4 [doi]
- Extending TLS with KMIP Protocol for Cloud ComputingMounira Msahli, Ahmed Serhrouchni, Mohamad Badra. 1-6 [doi]
- New Types of Alert Correlation for Security Information and Event Management SystemsGustavo Gonzalez Granadillo, Mohammed El Barbori, Hervé Debar. 1-7 [doi]
- RT-SENMOS: Sink-Driven Congestion and Error Control for Sensor NetworksCharilaos Stais, George Xylomenos, Evangelos Zafeiratos. 1-4 [doi]
- A Component-Based Cross-Layer Framework for Software Defined Wireless NetworksVasileios Karyotis, Eleni Stai, Symeon Papavassiliou. 1-6 [doi]
- Toward Energy Profiling of Connected Embedded SystemsNadir Cherifi, Gilles Grimaud, Alexandre Boe, Thomas Vantroys. 1-4 [doi]
- ANASTASIA: ANdroid mAlware detection using STatic analySIs of ApplicationsHossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti. 1-5 [doi]
- Inherent Resistance of Efficient ECC Designs against SCA AttacksZoya Dyka, Estuardo Alpirez Bock, Ievgen Kabin, Peter Langendörfer. 1-5 [doi]
- Efficient Communications for Location-Based Services Using Spare Extensions of Control Channels in Mobile NetworksMohammed Aal-Nouman, Haifa Takruri-Rizk, Martin Hope. 1-6 [doi]
- Towards Multipath TCP Aware Security TechnologiesZeeshan Afzal, Stefan Lindskog, Anna Brunstrom, Anders Liden. 1-8 [doi]
- Designing Time Slotted Channel Hopping and Information - Centric Networking for IoTOliver Hahm, Cédric Adjih, Emmanuel Baccelli, Thomas C. Schmidt, Matthias Wählisch. 1-5 [doi]
- Refining the Foundations for Cyber Zone DefenseRobert Mitchell, Paul Sery. 1-6 [doi]
- Coordination Strategy for Dense 5G Femtocell DeploymentsChristos Bouras, Georgios Diles. 1-5 [doi]
- Cooperative Watchdog for Malicious Failure Notification in Wireless Ad-Hoc NetworksNorihiro Sota, Hiroaki Higaki. 1-4 [doi]
- Social Location Awareness: A Prototype of Altruistic IoTSilvia Mirri, Catia Prandi, Paola Salomoni, Lorenzo Monti. 1-5 [doi]
- TerminAPTor: Highlighting Advanced Persistent Threats through Information Flow TrackingGuillaume Brogi, Valerie Viet Triem Tong. 1-5 [doi]
- Parameterizing Moving Target DefensesNicholas Anderson, Robert Mitchell 0001, Ing-Ray Chen. 1-6 [doi]
- White-Hat Hacking Framework for Promoting Security AwarenessSultan Al Sharif, Farkhund Iqbal, T. Baker, A. Khattack. 1-6 [doi]
- Optimal Power Allocation in Two-Tier MIMO Cognitive Femtocell Radio NetworksJerzy Martyna. 1-4 [doi]
- TSimNet: An Industrial Time Sensitive Networking Simulation Framework Based on OMNeT++Peter Heise, Fabien Geyer, Roman Obermaisser. 1-5 [doi]
- Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide InfectionsElias Bou-Harb, Mark Scanlon, Claude Fachkha. 1-5 [doi]
- A New Service Advertisement Message for ETSI ITS Environments: CAM-InfrastructureHouda Labiod, Alain Servel, Gerard Seggara, Badis Hammi, Jean Philippe Monteuuis. 1-4 [doi]
- Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed LimitHannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon. 1-5 [doi]
- MAC-Aware Routing in Multi-Sink WSN with Dynamic Back-Off Time and Buffer ConstraintLucas Leão, Violeta Felea, Hervé Guyennet. 1-5 [doi]
- A Brief Survey of Security Approaches for Cyber-Physical SystemsElias Bou-Harb. 1-5 [doi]
- Green Power Control in Underlaying Cognitive Radio NetworksJerzy Martyna. 1-5 [doi]
- Modeling of IP Scanning Activities with Hidden Markov Models: Darknet Case StudyGiulia De Santis, Abdelkader Lahmadi, Jérôme François, Olivier Festor. 1-5 [doi]
- Fully Distributed Approach for Energy Saving in Heterogeneous NetworksHocine Ameur, Moez Esseghir, Lyes Khoukhi. 1-6 [doi]
- Exploiting Ubiquitous Computing, Mobile Computing and the Internet of Things to Promote Science EducationIoannis D. Zaharakis, Nicolas Sklavos, Achilles Kameas. 1-2 [doi]
- Cyclic Beam Switching for Smart Grid NetworksPatrick Hosein, Laurielyse Girod-Williams, Cornelius van Rensburg. 1-4 [doi]
- A Case of Service Interaction in M2M Device ManagementAnastas Nikolov, Evelina Pencheva, Ivaylo Atanasov, Kamelia Nikolova. 1-5 [doi]
- Comparison of EM Probes Using SEMA of an ECC DesignChristian Wittke, Zoya Dyka, Peter Langendörfer. 1-5 [doi]
- Superregenerative Wake-Up Receiver with 20 µW Power Consumption for Human Body CommunicationsJuha Petäjäjärvi, Konstantin Mikhaylov, Heikki Karvonen, Risto Vuohtoniemi, Jari H. Iinatti. 1-5 [doi]
- Evaluation of the Redundancy-Bandwidth Trade-Off and Jitter Compensation in rMPTCPAxel Hunger, Pascal A. Klein, Martin H. Verbunt. 1-5 [doi]
- Three Innovative Directions Based on Secure Elements for Trusted and Secured IoT PlatformsPascal Urien. 1-2 [doi]
- Optimal Probabilistic Energy-Aware Routing for Duty-Cycled Wireless Sensor NetworksEvangelia Tsiontsiou, Bernardetta Addis, Ye-Qiong Song, Alberto Ceselli. 1-7 [doi]
- RFID Based Smart FridgeAbderrazak Hachani, Imen Barouni, Zeineb Ben Said, Lamis Amamou. 1-4 [doi]
- Peer to Peer Botnet Detection Based on Network Traffic AnalysisSuzan Almutairi, Saoucene Mahfoudh, Jalal S. Alowibdi. 1-4 [doi]
- Amplified Distributed Denial of Service Attack in Software Defined NetworkingMoreno Ambrosin, Mauro Conti, Fabio De Gaspari, Nishanth Devarajan. 1-4 [doi]
- Energy Efficient Multi-Layer Femtocell NetworksJun Zhang, Houda Labiod. 1-5 [doi]
- Towards User-Centered Privacy Risk Detection and Quantification FrameworkWelderufael B. Tesfay, Jetzabel Serna-Olvera. 1-5 [doi]
- Opportunistic Routing and Data Dissemination Protocol for Energy Harvesting Wireless Sensor NetworksOns Bouachir, Adel Ben Mnaouer, Farid Touati, Damiano Crescini. 1-5 [doi]
- Towards a Big Data Architecture for Facilitating Cyber Threat IntelligenceCharles Wheelus, Elias Bou-Harb, Xingquan Zhu. 1-5 [doi]
- Enhancing User Privacy in Federated eID SchemesKris Shrishak, Zekeriya Erkin, Remco Schaar. 1-5 [doi]
- Evaluation of a Fluid Dynamic Model in Wireless Sensor Networks for the Estimation of Maximum Traffic VolumeCharalambos Sergiou, Vasos Vassiliou, Aristodemos Paphitis. 1-5 [doi]
- Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and ImplementationsNicolas Sklavos, Ioannis D. Zaharakis. 1-2 [doi]
- Securing Information-Centric Networking without Negating MiddleboxesNikos Fotiou, George Xylomenos, George C. Polyzos. 1-5 [doi]
- An Approach to Detecting Text Autorship in the Spanish LanguageMauricio Iturralde, Roberto Maldonado, Daniel Fellig. 1-5 [doi]
- Cross Layer Design to Evaluate Scalable Video Traffic in Multihop Cognitive Radio EnvironmentSalman Saadat. 1-5 [doi]
- SenNet: A Programming Toolkit to Develop Wireless Sensor Network ApplicationsAymen J. Salman, Adil Al-Yasiri. 1-7 [doi]
- 60 GHz mmW Channel Measurements inside a BusAniruddha Chandra, Tomas Mikulasek, Jiri Blumenstein, Ales Prokes. 1-5 [doi]
- An IoT Middleware for Enhanced Security and Privacy: The RERUM ApproachGeorge Moldovan, Elias Z. Tragos, Alexandros G. Fragkiadakis, Henrich C. Pöhls, Daniel Calvo. 1-5 [doi]
- CoAP over ICNNikos Fotiou, Hasan Islam, Dmitrij Lagutin, Teemu Hakala, George C. Polyzos. 1-4 [doi]
- Performance Analysis of NEMO Augmented with MPTCPPratibha Mitharwal, Christophe Lohr, Annie Gravey. 1-5 [doi]
- Remote Identification of Port Scan ToolchainsVincent Ghiette, Norbert Blenn, Christian Doerr. 1-5 [doi]
- Grid Based Energy-Aware MAC Protocol for Wireless Nanosensor NetworkRawan Alsheikh, Nadine Akkari, Etimad A. Fadel. 1-5 [doi]
- A Novel Dynamic Hidden Semi-Markov Model (D-HSMM) for Occupancy Pattern Detection from Sensor Data StreamJose Luis Gomez Ortega, Liangxiu Han, Nicholas Bowring. 1-5 [doi]