default search action
ICFNDS 2019: Paris, France
- Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, ICFNDS 2019, Paris, France, July 01-02, 2019. ACM 2019, ISBN 978-1-4503-7163-6
- Muath AlShaikh, Lamri Laouamer, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh:
Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm. 1:1-1:6 - Oana-Mihaela Ungureanu, Calin Vladeanu, Robert E. Kooij:
Kubernetes cluster optimization using hybrid shared-state scheduling framework. 2:1-2:12 - Robert Marsh, Sana Belguith, Tooska Dargahi:
IoT Database Forensics: An Investigation on HarperDB Security. 3:1-3:7 - Feriel Khanouche, Lydia Maouche, Foudil Mir, Mohamed Essaid Khanouche:
Energy efficient Multi-hops Routing protocol based on Clusters Reorganization for wireless sensor networks. 4:1-4:10 - Brandon Thurgood, Ruth G. Lennon:
Cloud Computing With Kubernetes Cluster Elastic Scaling. 5:1-5:7 - Madalin-Dorin Pop, Octavian Prostean, Gabriela Prostean:
Multiple Lane Road Car-Following Model using Bayesian Reasoning for Lane Change Behavior Estimation: A Smart Approach for Smart Mobility. 6:1-6:8 - Mouhamed Amine Ouamri, Mohamed Azni:
Overshooting and Cost Minimization in LTE Cellular Network Using Non-dominate Sorting Genetic Algorithm based on Laplace Crossover. 7:1-7:6 - Badreddine Miles, Salim Chikhi, El-Bay Bourennane:
Carbon monoxide detection: an IoT application used as a tool for civil protection services to save lives. 8:1-8:4 - Ramzi Mosbah, Larbi Guezouli, Lyamine Guezouli:
Road obstacle detection. 9:1-9:5 - Mohammed Zubair, Devrim Unal, Abdulla K. Al-Ali, Abdullatif Shikfa:
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. 10:1-10:7 - Pedro F. Moraes, Joberto S. B. Martins:
A Pub/Sub SDN-Integrated Framework for IoT Traffic Orchestration. 11:1-11:9 - Syeda Sana e Zainab, M. Tahar Kechadi:
Sensitive and Private Data Analysis: A Systematic Review. 12:1-12:11 - Mohammad Alkhawatrah, Yu Gong, Omar Aldabbas, Mohammad Hammoudeh:
Buffer-Aided 5G Cooperative Networks: Considering the Source Delay. 13:1-13:6 - Musa Abubakar Muhammad, Aladdin Ayesh, Isabel Wagner:
Behavior-Based Outlier Detection for Network Access Control Systems. 14:1-14:6 - Maik Benndorf, Martin Gaedke, Thomas Haenselmann:
Towards gait analysis - Creating a setup for the analyses under laboratory conditions. 15:1-15:5 - Raghad Jawabreh, Narmeen Darawshe, Othman Othman, Ahmed Awad:
FogNetwork Orchestration for Heterogeneous Networks. 16:1-16:2 - Ahmad Lhwani, Abed-Alrhman Mosallam, Aws Alawneh, Ahmed Awad, Othman Othman:
A Low Power Boundary Nodes Detection Algorithm for Wireless Sensor Networks (WSNs). 17:1-17:8 - Jesus Pacheco, Victor H. Benitez, Luis Félix:
Anomaly Behavior Analysis for IoT Network Nodes. 18:1-18:6 - Mohamed Mohammedi, Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Cryptanalysis and Improvement of Identity-Based Multisignature Scheme. 19:1-19:5 - Khaled Bedjou, Faiçal Azouaou, Abdelouhab Aloui:
Detection of terrorist threats on Twitter using SVM. 20:1-20:5 - Mohammed Amine Yagoub, Abdelkader Laouid, Ahcène Bounceur, Muath AlShaikh:
An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms. 21:1-21:7 - Nabil Kadjouh, Ahcène Bounceur, Abdelkamel Tari, Reinhardt Euler, Loïc Lagadec, Abdelkader Laouid:
Temperature-based models of batteries for the simulation of Wireless Sensor Networks. 22:1-22:6 - Nabil Kadjouh, Ahcène Bounceur, Abdelkamel Tari, Loïc Lagadec, Reinhardt Euler, Madani Bezoui:
A New Leader Election Algorithm based on the WBS Algorithm Dedicated to Smart-cities. 23:1-23:5 - Hien Tran, Tarek Menouer, Patrice Darmon, Abdoulaye Doucoure, François Binder:
Smart Contracts Search Engine in Blockchain. 24:1-24:5 - Abdullah Soliman Alshra'a, Jochen Seitz:
External Device to Protect the Software-Defined Network Performance in Case of a Malicious Attack. 25:1-25:6 - Mohamed Essaid Khanouche, Sihem Mouloudj, Melissa Hammoum:
Two-steps QoS-aware services composition algorithm for Internet of Things. 26:1-26:6 - Mohammad Hammoudeh, Ibrahim Ghafir, Ahcène Bounceur, Thomas Rawlinson:
Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain. 27:1-27:5 - Mohamed Amine Khelif, Jordane Lorandel, Olivier Romain, Matthieu Regnery, Denis Baheux:
A Versatile Emulator of MitM for the identification of vulnerabilities of IoT devices, a case of study: smartphones. 28:1-28:6 - Abdelrahman Abuarqoub:
A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing. 29:1-29:7 - Karim Akilal, Mawloud Omar, Hachem Slimani:
A wider picture of trust: confronting multi-contextual social traits for trust inference. 30:1-30:5 - Congduc Pham, Ahcène Bounceur, Laurent Clavier, Umber Noreen, Muhammad Ehsan:
Investigating and Experimenting Interference Mitigation by Capture Effect in LoRa Networks. 31:1-31:6 - Georgios L. Stavrinides, Helen D. Karatza:
Scheduling Single-Task Jobs along with Bag-of-Task-Chains in Distributed Systems. 32:1-32:6 - Amjad Rattrout, Ateeq Ateeq:
Sentiment Analysis on Arabic Content in Social Media: Hybrid Model of Dictionary Based and Fuzzy Logic. 33:1-33:11 - Sahar Ajmal, Muteeb Bin Muzammil, Abid Jamil, Syed Manzar Abbas, Umer Iqbal, Pariwish Touseef:
Survey on Cache Schemes in Heterogeneous Networks using 5G Internet of Things. 34:1-34:8 - Moneeb Ahmed, Ihsan Elahi, Muhammad Abrar, Umair Aslam, Iqra Khalid, Muhammad Asif Habib:
Understanding Blockchain: Platforms, Applications and Implementation Challenges. 35:1-35:8 - Pariwish Touseef, Khubaib Amjad Alam, Abid Jamil, Hamza Tauseef, Sahar Ajmal, Rimsha Asif, Bisma Rehman, Sumaira Mustafa:
Analysis of Automated Web Application Security Vulnerabilities Testing. 36:1-36:8 - Sumaira Mustafa, Khubaib Amjad Alam, Bilal Khan, Muhammad Habib Ullah, Pariwish Touseef:
Fair Coexistence of LTE and WiFi-802.11 in Unlicensed Spectrum: A Systematic Literature Review. 37:1-37:10 - Bisma Rehman, Khubaib Amjad Alam, Mubashar Rehman, Abid Jamil, Pariwish Touseef, Rimsha Asif:
Combinatorial Testing of Web Services: A Systematic Mapping. 38:1-38:7 - Rimsha Asif, Khubaib Amjad Alam, Abid Jamil, Pariwish Touseef, Bisma Rehman:
WorkFlow Application Scheduling in Cloud Computing: A Systematic Literature Review (SLR). 39:1-39:7 - Muhammad Noman Javed, Hammad Shafiq, Khubaib Amjad Alam, Abid Jamil, Muhammad Umar Sattar:
VANET's Security Concerns and Solutions: A Systematic Literature Review. 40:1-40:12 - Muhammad Rehman Shahid, Sheraz Mehmood, Sana Hafeez, Bilal Zahid, Sohail Jabbar, Rehan Ashraf:
Blockchain Based Share Economy Trust Point: Case Study Based Validation. 41:1-41:5 - Ahmad Bilal, Majid Hussain:
LRAP: A Learned Reflex Action Embedded Associative Context Learning based Processing Efficient Paradigm in Visual Sensor Networks. 42:1-42:9 - Muhammad Arslan Sarwar, Majid Hussain, Muhammad Usman Anwar, Mudassar Ahmad:
FlowJustifier: An optimized trust-based request prioritization approach for mitigation of SDN controller DDoS attacks in the IoT paradigm. 43:1-43:9 - Samreen Arshad, Qamar Raza, Majid Hussain:
VANETs Embedded Novel Traffic Management Paradigm for Smart City Milieu. 44:1-44:10 - Anum Ghaffar, Majid Hussain:
BCEAP - A Blockchain Embedded Academic Paradigm to Augment Legacy Education through Application. 45:1-45:11 - Hafiz Shakir Mehmood, Rana Zeeshan Ahmad, Muhammad Jehanzaib Yousuf:
A Comprehensive Review of Adaptive Noise Cancellation Techniques in the Internet of Things. 46:1-46:8 - Muhammad Akhtar, Majid Hussain, Jehangir Arshad, Mudassar Ahmad:
User Authentication Scheme for Greenhouse Remote Monitoring System using WSNs/IOT. 47:1-47:8 - Muhammad Yousaf, Naeem Abbas, Farooq Ali, Muhammad Munwar Iqbal, Yasar Amin, Adeel Akram:
Miniaturized High Gain Antenna for Biomedical Application. 48:1-48:7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.