Abstract is missing.
- IoT-NETZ: Practical Spoofing Attack Mitigation Approach in SDWN NetworkHamzeh Mohammadnia, Slimane Ben Slimane. 5-13 [doi]
- Network GPRS Prototype based on SDR and OpenBTS, as an IoT-lab TestbedOscar Enrique Llerena Castro. 14-19 [doi]
- Accelerating Platform Deployments in the Cloud: A Qualitative Assessment Based on CORDAngelos Mimidis Kentis, José Soler, Adam Broadbent, Paul Veitch. 20-23 [doi]
- Spectrum-time Availability-aware Routing Mechanism for Software-Defined Networks with Out-of-band Full-Duplex CapabilitiesHaythem Bany Salameh, Haneen Khasawneh. 24-28 [doi]
- Using Digital Twin Data for the Attribute-Based Usage Control of Value-Added NetworksAlexander Kern, Reiner Anderl. 29-36 [doi]
- Possibilities and Challenges for Reconfigurable Hardware and Cloud Architectures in Data-Intensive Scientific ApplicationsMohammed Bawatna, Oliver Knodel, Rainer G. Spallek. 37-42 [doi]
- A Parameter Selection Process by Data Analysis for Tuning Multi-threaded Time-Stepping AlgorithmsThomas Rauber, Gudula Rünger. 43-50 [doi]
- Comparison of Fast-Reroute Mechanisms for BIER-Based IP MulticastDaniel Merling, Steffen Lindner, Michael Menth. 51-58 [doi]
- Analysis of trends in scientific publications by an NLP toolkit: A case study in Software Development Methods for Enhanced Living EnvironmentMelaku Girma, Nuno M. Garcia, Eftim Zdravevski, Mesfin Kifle, Nuno Pombo, Vladimir Trajkovik. 59-66 [doi]
- Development of OpenFlow Native Capabilities to optimize QoSMohamed Saleh Al Breiki, Suiping Zhou, Yuan Roger Luo. 67-74 [doi]
- Behavior-Driven Re-engineering for Testing the CloudBehailu Getachew Wolde, Abiot Sinamo Boltana. 75-82 [doi]
- Network Obfuscation for Net Worth SecurityLouma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. 83-88 [doi]
- Android CompCache based on Graphics Processing UnitMuder Almiani, Abdul Razaque, Shen Ziqi, Ge Yaqin, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh. 89-94 [doi]
- Secure Password-Driven Fingerprint Biometrics AuthenticationAbdul Razaque, Kalkamanova Kamila Myrzabekovna, Spanova Yerkezhan Magbatkyzy, Muder Almiani, Baktygulova Aray Doszhanovna, Awny Alnusair. 95-99 [doi]
- Exploiting SDN to Improve QoS of Smart City Networks Against Link FailuresRazan AlZoman, Mohammed J. F. Alenazi. 100-106 [doi]
- Programmable Dataplane Architecture for Distributed Services at the Network EdgeMario Baldi, Diego Crupnicoff, Silvano Gai. 107-114 [doi]
- Latency-Sensitive Web Service Workflows: A Case for a Software-Defined InternetPradeeban Kathiravelu, Peter Van Roy, Luís Veiga, Elhadj Benkhelifa. 115-122 [doi]
- Sequential Wave Imprinting Machine (SWIM) Implementation using SDR (Software-Defined Radio)Steve Mann, Phillip V. Do, Zhao Lu, Jacky K. K. Lau. 123-130 [doi]
- Measuring the Impacts of Virtualization on the Performance of Thread-Based ApplicationsRahaf Al-hamouri, Heba Al-Jarrah, Ziad A. Al-Sharif, Yaser Jararweh. 131-138 [doi]
- Improving Farmers' Participation in Agri Supply Chains with Blockchain and Smart ContractsMalni Kumarathunga. 139-144 [doi]
- Health Care Insurance Fraud Detection Using BlockchainGökay Saldamli, Vamshi Reddy, Krishna S. Bojja, Manjunatha K. Gururaja, Yashaswi Doddaveerappa, Lo'ai Tawalbeh. 145-152 [doi]
- Securing Car Data and Analytics using BlockchainGökay Saldamli, Kavitha Karunakaran, Vidya K. Vijaykumar, Weiyang Pan, Siddesh Puttarevaiah, Levent Ertaul. 153-159 [doi]
- A Decentralized Voting Mechanism: Engaging ERC-20 token holders in decision-makingPanayiotis Christodoulou, Klitos Christodoulou. 160-164 [doi]
- Rationale and Practical Assessment of a Fully Distributed Blockchain-based Marketplace of Fog/Edge Computing ResourcesMiguel Pincheira, Massimo Vecchio, Raffaele Giaffreda. 165-170 [doi]
- Identity-of-Things Model using Composite Identity on Permissioned Blockchain NetworkAnang Hudaya Muhamad Amin, Nabih Abdelmajid, Fred N. Kiwanuka. 171-176 [doi]
- Trends in Development of Databases and BlockchainMayank Raikwar, Danilo Gligoroski, Goran Velinov. 177-182 [doi]
- The Genesy Model for a Blockchain-based Fair Ecosystem of Genomic DataFederico Carlini, Roberto Carlini, Stefano Dalla Palma, Remo Pareschi, Federico Zappone, Daniele Albanese. 183-189 [doi]
- Mobile Encounter-based Social Sybil ControlMartin-Martinez, Arvin Hekmati, Bhaskar Krishnamachari, Seokgu Yun. 190-195 [doi]
- Blockchain Analysis Tool For Monitoring Coin FlowAman Framewala, Sarvesh Harale, Shreya Khatal, Dhiren R. Patel, Yann Busnel, Muttukrishnan Rajarajan. 196-201 [doi]
- Towards Valid Use Cases: Requirements and Supporting Characteristics of Proper Blockchain ApplicationsUlrich Gallersdörfer, Florian Matthes. 202-207 [doi]
- Blockchain-Based Solution to Prevent Plastic Pipes FraudPavel Kostyuk, Sergey Kudryashov, Yash Madhwal, Ivan Maslov, Vladislav Tkachenko, Yury Yanovich. 208-213 [doi]
- Using Blockchain Technology for Continuing Medical Education Credits SystemJash Rathod, Ashutosh Gupta, Dhiren Patel. 214-219 [doi]
- An Efficient Cold Start Solution for Recommender Systems Based on Machine Learning and User InterestsBilal Hawashin, Shadi AlZubi, Ala Mughaid, Farshad Fotouhi, Ahmad Abusukhon. 220-225 [doi]
- Efficient Context-aware File System ApproachAbdul Razaque, Fathi H. Amsaad, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf M. Ganda, Majdi Rawashdeh, Amer Al-Rahayfeh. 226-230 [doi]
- Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and DataAbdul Razaque, Fathi H. Amsaad, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahamed, Ayman Al-Dmour, Meer Jaro Khan, Raouf M. Ganda. 231-234 [doi]
- New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color ValueAhmad Abusukhon, Shadi AlZu'bi. 235-239 [doi]
- Load Balancing Techniques in Software-Defined Cloud Computing: an overviewAhmad A. A. Alkhatib, Thaer Sawalha, Shadi AlZu'bi. 240-244 [doi]
- Maintenance Requests Labeling Using Machine Learning ClassificationMohammed Lafi, Bilal Hawashin, Shadi AlZu'bi. 245-249 [doi]
- Power Measurement System in a Microwave Link using SDR for Rain Rate EstimationBoris Ramos, Álvaro Bustamante, Maricela Freire. 250-255 [doi]
- Formal Verification and Analysis of Primary Authentication based on 5G-AKA ProtocolEd Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keng Loo. 256-261 [doi]
- 5G Radio Access Network Slicing in Massive MIMO Systems for Industrial ApplicationsHaorui Peng, Emma Fitzgerald, William Tärneberg, Maria Kihl. 262-267 [doi]
- Reinforcement Learning for Task Offloading in Mobile Edge Computing for SDN based Wireless NetworksKiran Nahida, Chunyu Pan, Changchuan Yin. 268-273 [doi]
- Flow-based QoS forwarding strategy: a practical implementation and evaluationSantiago Bentancur, Martín Fernández Bon, Gabriel Gómez Sena, Claudina Rattaro, Ignacio Brugnoli. 274-279 [doi]