default search action
NTMS 2014: Dubai, United Arab Emirates
- Mohamad Badra, Omar Alfandi:
6th International Conference on New Technologies, Mobility and Security, NTMS 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014. IEEE 2014, ISBN 978-1-4799-3223-8 - Maciej Nikodem, Mariusz Slabicki, Tomasz Surmacz, Bartosz Wojciechowski:
Transmission Power Control Based on Packet Reception Rate. 1-4 - Alexandra K. Michota, Sokratis K. Katsikas:
Compliance of the Facebook Data Use Policy with the Principles of ISO 29100: 2011. 1-5 - Cagin Turkoglu, Serhat Cagdas, Anil Çelebi, Sarp Ertürk:
Hardware Design of Anembedded Real-Time Acoustic Source Location Detector. 1-4 - Hamad Binsalleeh, A. Mert Kara, Amr M. Youssef, Mourad Debbabi:
Characterization of Covert Channels in DNS. 1-5 - Omar Sami Oubbati, Nasreddine Lagraa, Abderrahmane Lakas, Mohamed Bachir Yagoubi:
IRTIV: Intelligent Routing Protocol Using Real Time Traffic Information in Urban Vehicular Environment. 1-4 - Amine Boukhtouta, Nour-Eddine Lakhdari, Mourad Debbabi:
Inferring Malware Family through Application Protocol Sequences Signature. 1-5 - Roch H. Glitho:
Cloudifying the 3GPP IP Multimedia Subsystem: Why and How? 1-5 - Manabu Ito, Kiyohide Nakauchi, Yozo Shoji, Yoshinori Kitatsuji:
Mechanism of Reducing Signaling Processing Load in EPC/IMS Using Service-Specific Network Virtualization. 1-5 - Chahine Ben Moussa, François Gagnon, Ouassima Akhrif, Samuel Gagné:
Aerial Mast vs Aerial Bridge Autonomous UAV Relay: A Simulation-Based Comparison. 1-5 - Saied M. Abd El-atty, Z. M. Gharsseldien, Konstantinos Lizos:
On Performance of SISO Nanonetworks-based Molecular Communications. 1-5 - Nabih Jaber:
Efficient Home Energy Management System. 1-4 - Karel Heurtefeux, Elyes Ben Hamida, Hamid Menouar:
Design and Implementation of a Sustainable Wireless BAN Platform for Remote Monitoring of Workers Health Care in Harsh Environments. 1-5 - Alaa Awad, Medhat Hamdy, Amr Mohamed:
Transmission Delay Minimization for Energy Constrained Communication in Wireless Body Area Sensor Networks. 1-5 - Omar Abu-Ella, Mohammed S. Elmusrati:
Partial Constrained Group Decoding: A New Interference Mitigation Technique for the Next Generation Networks. 1-5 - Jianwei Zhang, Chaoxian Zhang, Weikai Xu, Lin Wang:
A New Simulation Model Based on EESM for VANETS. 1-5 - Giulia Mauri, Giacomo Verticale:
On the Tradeoff between Performance and User Privacy in Information Centric Networking. 1-5 - Björn Lichtblau, Andreas Dittrich:
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols. 1-6 - Kamran Ayub:
IR-UWB Radio Architecture for Wireless Sensors Network Based on Pilot Signal Assisted MAC. 1-5 - Hiroaki Higaki:
Virtual Traffic Signals by Cooperation among Vehicle-Mounted Mobile Computers. 1-6 - Mohammed D. Halloush:
Selective Network Coding for Reliable Wireless Broadcast. 1-5 - Khaled Dassouki, Haïdar Safa, Abbas Hijazi:
End to End Mechanism to Protect Sip from Signaling Attacks. 1-5 - Farhan Mohammed, Ahmed Idries, Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar:
Opportunities and Challenges of Using UAVs for Dubai Smart City. 1-4 - Antti Juvonen, Timo Hämäläinen:
An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction. 1-5 - Timo Koskela, Jarkko M. Vatjus-Anttila, Toni Dahl:
Communication Architecture for a P2P-Enhanced Virtual Environment Client in a Web Browser. 1-5 - Arshad Hussain, Najeeb ul Hassan, Farah Nadeem:
Measurement Based Call Admission Control (CAC) to Improve QoS for IEEE 802.11E WLAN. 1-4 - André Pereira, João Bosco M. Sobral, Carla M. Westphall:
Towards Scalability for Federated Identity Systems for Cloud-Based Environments. 1-5 - Bashar Kabbani, Romain Laborde, François Barrère, Abdelmalek Benzekri:
Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations. 1-6 - Gérôme Bovet, Jean Hennebert:
Distributed Semantic Discovery for Web-of-Things Enabled Smart Buildings. 1-5 - Sepehr Keykhaie, Arman Mahmoudifar:
Study of Connectivity in a Vehicular Ad Hoc Network with Random Node Speed Distribution. 1-4 - Rasool Sadeghi, João Paulo Barraca, Rui L. Aguiar:
Cooperation Metric for IEEE 802.11 Wireless Networks. 1-5 - Hanen Idoudi:
Lightweight Balanced Power Saving MAC Protocol for Wireless Sensor Networks. 1-5 - Badis Hammi, Rida Khatoun, Guillaume Doyen:
A Factorial Space for a System-Based Detection of Botcloud Activity. 1-5 - Amr Ali Eldin, Jan van den Berg:
A Self-disclosure Framework for Social Mobile Applications. 1-5 - Juan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor:
Group-Based Characterization for the I2P Anonymous File-Sharing Environment. 1-5 - Tallal Elshabrawy, Ramy Mourad:
Power-Aware ON/OFF Switching Strategies of ENodeB for Green LTE Networks. 1-4 - Dimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias, George Stergiopoulos:
Insider Threat: Enhancing BPM through Social Media. 1-6 - Bassem El Zant, Maurice Gagnaire:
New Pricing Policies for Federated Cloud. 1-6 - Ghayet El Mouna Zhioua, Houda Labiod, Nabil Tabbane, Sami Tabbane:
VANET Inherent Capacity for Offloading Wireless Cellular Infrastructure: An Analytical Study. 1-5 - Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, Omar Alfandi:
An Approach for the Validation of File Recovery Functions in Digital Forensics' Software Tools. 1-6 - Ridha Soua, Pascale Minet, Erwan Livolant:
A Distributed Joint Channel and Slot Assignment for Convergecast in Wireless Sensor Networks. 1-5 - Ali K. Hmood, Benjamin C. M. Fung, Farkhund Iqbal:
Privacy-Preserving Medical Reports Publishing for Cluster Analysis. 1-8 - Claude Fachkha, Elias Bou-Harb, Mourad Debbabi:
Fingerprinting Internet DNS Amplification DDoS Activities. 1-5 - Ali Hakam, Raed M. Shubair, Ehab Salahat, Ammar Saadi:
Robust DOA Estimation Using a 2D Novel Smart Antenna Array. 1-4 - Nadjia Kara, May El Barachi, Abderrahmane El Bardai, Omar Alfandi:
A New Business Model and Architecture for Context-Aware Applications Provisioning in the Cloud. 1-5 - Prabhakar Varadarajan, Garth V. Crosby:
Implementing IPsec in Wireless Sensor Networks. 1-5 - Charalambos Sergiou, Vasos Vassiliou:
HRTC: A Hybrid Algorithm for Efficient Congestion Control in Wireless Sensor Networks. 1-5 - Zahia Bidai, Moufida Maimour:
Multipath Routing for High-Data Rate Applications in ZigBee Wireless Sensor Networks. 1-5 - Soma Pandey, Vijay Pande, Govind R. Kadambi, Yuri Vershinin:
A Layer 2 Wired-Wireless Interworking Model to Achieve Throughput Improvement. 1-4 - Tassos Dimitriou:
Secure and Scalable Aggregation in the Smart Grid. 1-5 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Trusted Platform Module for Smart Cards. 1-5 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Nikos Papadakis:
A Reasoning System for Composition Verification and Security Validation. 1-4 - Zinon Zinonos, Vasos Vassiliou:
Handoff Algorithms for Industrial Mobile Wireless Sensor Networks. 1-6 - Nesrine Kaaniche, Maryline Laurent:
A Secure Client Side Deduplication Scheme in Cloud Storage Environments. 1-7 - Mohamed Azab:
Multidimensional Diversity Employment for Software Behavior Encryption. 1-5 - Nedaa Al Barghouthy, Andrew Marrington:
A Comparison of Forensic Acquisition Techniques for Android Devices: A Case Study Investigation of Orweb Browsing Sessions. 1-4 - Ali Hakam, Noha Abou Aly, Shihab Jimaa:
Impulsive Noise Mitigation in a MIMO-OFDM Communication System. 1-5 - Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Quang Hieu Vu:
On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit. 1-4 - Mohamed Lehsaini, Hervé Guyennet:
Checkpoint-based Fault-tolerance for LEACH Protocol. 1-4 - Ali El Masri, Ahmad Sardouk, Lyes Khoukhi, Leïla Merghem-Boulahia, Dominique Gaïti:
Multimedia Support in Wireless Mesh Networks Using Interval Type-2 Fuzzy Logic System. 1-5 - Bassem Mokhtar, Mohamed Eltoweissy:
Towards a Data Semantics Management System for Internet Traffic. 1-5 - Namusale Chama, Rute C. Sofia, Susana Sargento:
Node Spatial Correlation Aware Routing Metrics for User-Centric Environments. 1-5 - Ronald Petrlic, Christoph Sorge:
Privacy-Preserving Digital Rights Management based on Attribute-based Encryption. 1-5 - Omar Mohamed, Ho-Jin Choi, Youssef Iraqi:
Fall Detection Systems for Elderly Care: A Survey. 1-4 - Ahmed Serageldin, Axel W. Krings:
The Impact of Redundancy on DSRC Safety Application Reliability under Different Data Rates. 1-5 - Ines Khoufi, Anis Laouiti, Bachar Wehbi:
TAR Channel Access Mechanism: A Study of a Highway Ramp Car Merge Case. 1-5 - Andreea Corici, Asma Elmangoush, Ronald Steinke, Thomas Magedanz, Joyce B. Mwangama, Neco Ventura:
Utilizing M2M Technologies for Building Reliable Smart Cities. 1-5 - Saied M. Abd El-atty, Konstantinos Lizos:
A MAC Scheme-Based Cooperative Codes for Vehicular Connectivity in AHVN. 1-5 - Stefano Avallone, Giovanni Di Stasi:
WiMesh: A Tool for the Performance Evaluation of Multi-Radio Wireless Mesh Networks. 1-5 - Torsten Zimmermann, Hanno Wirtz, Oscar Puñal, Klaus Wehrle:
Analyzing Metropolitan-Area Networking within Public Transportation Systems for Smart City Applications. 1-5 - Gbolahan Aiyetoro, Fambirai Takawira:
A Cross-layer Based Packet Scheduling Scheme for Multimedia Traffic in Satellite LTE Networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.