


default search action
ICFNDS 2017: Cambridge, UK
- Mohammad Hammoudeh, Robert M. Newman:
Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS 2017, Cambridge, United Kingdom, July 19-20, 2017. ACM 2017, ISBN 978-1-4503-4844-7 - Zan Li:
Intelligent FH Sequence for High Security Satellite Communication: The Generation, Performance Analysis and Application. 1:1 - Julie A. McCann:
From IoT to Ephemeral Computing: Understanding Cyber-Physical Interactions. 2 - Liangxiu Han
:
Towards Sustainable Smart Society: Big Data Driven Approaches. 3 - Muhammad Ali Imran:
Distributed, Autonomous and Resilient Networks: Joint RAN and Backhaul Optimisation. 4 - Motaz Daadoo, Amna Eleyan
, Derar Eleyan
:
Optimization Water Leakage Detection using Wireless Sensor Networks (OWLD). 5:1-5:11 - Diaa M. Uliyan
, Hamid Abdullah Jalab, Abdelrahman Abuarqoub, Muhannad A. Abu-Hashem
:
Segmented-Based Region Duplication Forgery Detection Using MOD Keypoints and Texture Descriptor. 6:1-6:6 - Kelvin O. O. Anoh, Bamidele Adebisi
, Olamide Jogunola
, Mohammad Hammoudeh
:
Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System. 7 - Yahya Atwady, Mohammad Hammoudeh
:
A Survey on Authentication Techniques for the Internet of Things. 8 - Eman Yasser Daraghmi, Amna Eleyan
:
An Improved Dynamic Load Balancing Algorithm applied to a Cafeteria System in a University Campus. 9:1-9:11 - Afnan Aloraini, Mohammad Hammoudeh
:
A Survey on Data Confidentiality and Privacy in Cloud Computing. 10:1-10:7 - Beatrice Rossi, Marco Patanè, Pasqualina Fragneto, Andrea Fusiello:
Robust Localization in Wireless Sensor Networks via Low-rank and 'Sparse Matrix Decomposition. 11:1-11:10 - Gökçe Çaylak Kayaturan, Alexei Vernitski:
Encoding Shortest Paths in Triangular Grids for Delivery Without Errors. 12:1-12:5 - Yousef-Awwad Daraghmi
, Motaz Daadoo, Derar Eleyan
:
User Centered Method for Enhancing the Adoption of Software Systems in Palestine. 13:1-13:11 - Muhannad A. Abu-Hashem
, Diaa M. Uliyan
, Abdelrahman Abuarqoub:
A Shared Memory Method For Enhancing The HTNGH AlgorithmPerformance: Proposed Method. 14:1-14:6 - Sahrish Khan Tayyaba
, Munam Ali Shah
, Omair Ahmad Khan, Abdul Wahab Ahmed:
Software Defined Network (SDN) Based Internet of Things (IoT): A Road Ahead. 15:1-15:8 - Chenxi Li, Zan Li, Lei Guan, Peihan Qi, Jiangbo Si, Benjian Hao:
Measuring the Complexity of Chaotic Time Series by Fuzzy Entropy. 16:1-16:7 - Jie Jiang, Riccardo Pozza
, Kristrún Gunnarsdóttir
, Nigel Gilbert
, Klaus Moessner:
Recognising Activities at Home: Digital and Human Sensors. 17:1-17:11 - Ahmed Qaddus, Saleem Aslam, Abid Ali Minhas
, Abdulaziz S. Almazyad:
5G Hetrogeneous Cellular Networks a Viable Mode for Implementing Future Smart Grid Networks. 18 - Mai Alfawair:
A Cloud Storage Architecture for High Data Availability, Reliability, and Fault-tolerance. 19:1-19:6 - Marwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele, Mohammad Hammoudeh
:
IoT Mashups: From IoT Big Data to IoT Big Service. 20 - Majdi M. Mafarja
, Derar Eleyan
, Salwani Abdullah, Seyedali Mirjalili
:
S-Shaped vs. V-Shaped Transfer Functions for Ant Lion Optimization Algorithm in Feature Selection Problem. 21:1-21:7 - Abdelhamied A. Ateya
, Ammar Muthanna
, Irina A. Gudkova
, Anastasia Vybornova
, Andrey Koucheryavy
:
Intelligent core network for Tactile Internet system. 22:1-22:6 - Ammar Muthanna
, Abdukodir Khakimov
, Irina A. Gudkova
, Alexander Paramonov
, Andrei Vladyko
, Ruslan Kirichek:
OpenFlow switch buffer configuration method. 23:1-23:5 - Hatem Hassan, Ahmad Mostafa, Ahmed Shawish:
ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud Storage. 24:1-24:8 - Imad Ez-Zazi
, Mounir Arioua
, Ahmed El Oualkadi
, Younes el Assari
:
Joint FEC/CRC coding scheme for energy constrained IOT devices. 25:1-25:8 - Younes el Assari
, Mounir Arioua
, Ahmed El Oualkadi
, Imad Ez-Zazi
:
Zone Divisional Approach for Energy Balanced Clustering Protocol in Wireless Sensor Network. 26:1-26:7 - Ibrahim Ghafir, Vaclav Prenosil
, Mohammad Hammoudeh
, Liangxiu Han
, Umar Raza
:
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. 27 - Youness Riouali, Laila Benhlima, Slimane Bah:
Toward a Global WSN-Based System to Manage Road Traffic. 28:1-28:6 - Pablo C. Calcina-Ccori
, Laisa Caroline de Paula Costa
, Geovane Fedrecheski, John Esquiagola
, Marcelo Zuffo
, Flávio S. Corrêa da Silva:
Agile servient integration with the Swarm: Automatic code generation for nodes in the Internet of Things. 30:1-30:6 - Mohammad Saleh, Jaafar Gaber
, Maxime Wack:
Sensor Networks Applications Performance Measures for IEEE802.11n WiFi Security Protocols. 31:1-31:4 - Levis Zerpa
:
The Message-Passing Interface and Parallel SAT-Solvers. 32:1-32:7 - Monther Aldwairi
, Hesham H. Alsaadi
:
FLUKES: Autonomous Log Forensics, Intelligence and Visualization Tool. 33:1-33:6 - Steve Moffat, Mohammad Hammoudeh
, Robert Hegarty
:
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. 34 - S. D. Zhi, Y. B. Wei, Z. H. Yu:
Air Quality Monitoring Platform based on Remote Unmanned Aerial Vehicle with Wireless Communication. 35:1-35:7 - Z. H. Yu, Y. B. Wei, S. D. Zhi:
The design and application of information management system for precast concretes based on IOT. 36:1-36:4 - Umar Raza
, James Lomax, Ibrahim Ghafir, Rupak Kharel, Ben Whiteside:
An IoT and business processes based approach for the monitoring and control of high value-added manufacturing processes. 37:1-37:8 - Adam Coates, Mohammad Hammoudeh
, Kieran Gerard Holmes:
Internet of Things for Buildings Monitoring: Experiences and Challenges. 38 - J. K. Mohsin, Liangxiu Han
, Mohammad Hammoudeh
, Robert Hegarty
:
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments. 39:1-39:10 - Kieran Gerard Holmes, Adam Coates, Mohammad Hammoudeh
:
Motion Capture Using the Internet of Things Technology: A Tutorial. 40 - Sobia Arshad, Muhammad Awais Azam
, Syed Hassan Ahmed
, Jonathan Loo
:
Towards Information-Centric Networking (ICN) Naming for Internet of Things (IoT): The Case of Smart Campus. 41:1-41:6 - Syed Bilal Hussain Shah, Fuliang Yin, Inam Ullah Khan, Zhe Chen, Muhammad Zakarya
:
Collating and Analysing State-of-the-Art Hierarchical Routing Protocols in WSN to Increase Network Lifetime and Conserve Energy. 42:1-42:10 - Umber Noreen, Ahcène Bounceur, Laurent Clavier
:
Modeling Interference for Wireless Sensor Network Simulators. 43:1-43:6 - Peter Barker, Mohammad Hammoudeh
:
A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks. 44:1-44:8 - Samia Bouyakoub, Abdelkader Belkhir
, Fayçal M'hamed Bouyakoub
, Wassila Guebli:
Smart airport: an IoT-based Airport Management System. 45:1-45:7 - Musa Abubakar Muhammad, Aladdin Ayesh
, Pooneh Bagheri Zadeh:
Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access Control. 46:1-46:8 - Mazhar Hussain Malik, Abdul Majeed, Mehmet Emin Aydin
, Mubasher Hussain Malik:
A Parametric Study for Congestion Control in Queuing Networks. 47 - Nicolas Velasquez, Camilo Medina, Diego M. Castro
, Juan Camilo Acosta
, Diego Mendez
:
Design and Development of an IoT System Prototype for Outdoor Tracking. 48:1-48:6 - Camilo Rodriguez, Diego M. Castro
, William Coral Cuellar
, Jose L. Cabra, Nicolas Velasquez, Julián Colorado, Diego Mendez
, Luis Carlos Trujillo Arboleda
:
IoT system for Human Activity Recognition using BioHarness 3 and Smartphone. 49:1-49:7 - Abdelrahman Abuarqoub, Hesham Abusaimeh
, Mohammad Hammoudeh
, Diaa M. Uliyan
, Muhannad A. Abu-Hashem
, Sharefa Murad, Mudhafar M. Al-Jarrah, Fayez Al-Fayez
:
A Survey on Internet of Thing Enabled Smart Campus Applications. 50:1-50:7 - Hadeel Samara, Sharefa Murad, Abdallah Qusef
, Abdelrahman Abuarqoub:
Backshoring: Main Drives and Effects. 51:1-51:5 - Jibran Saleem, Bamidele Adebisi
, Ruth Ande, Mohammad Hammoudeh
:
A state of the art survey - Impact of cyber attacks on SME's. 52 - Muath Sabha
, Jacquleen Joubran Abu Daoud:
Adaptive Camera Placement for Open Heritage Sites. 53:1-53:7 - Mudhafar M. Al-Jarrah, Zaid H. Al-Taie, Abdelrahman Abuarqoub:
Steganalysis Using LSB-Focused Statistical Features. 54:1-54:5 - Kelvin O. O. Anoh, Bamidele Adebisi
, Mohammad Hammoudeh
:
A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication Systems. 55:1-55:6 - Asad Ali Khan, Majid Hussain, M. Zafrullah, M. Sultan Zia:
A Convergence Time Optimization Paradigm for OSPF based Networks Through SDN SPF Protocol Computer Communications and Networks (CCN)/Delay Tolerant Networks. 56:1-56:6 - Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security. 57:1-57:6 - Ulfat Imdad, Muhammad Asif Habib, Mudassar Ahmad, Nasir Mahmood, Rehan Ashraf:
Auto Configuration Based Enhanced and Secure Domain Naming Service for IPV-6 Internet of Things. 58:1-58:5 - Muhammad Yasir, Muhammad Asif Habib, Muhammad Shahid, Mudassar Ahmad:
Agent-based Modeling and Simulation of Virus on a Scale-Free Network. 59:1-59:6 - Muhammad Naeem, Rehan Ashraf, Nouman Ali
, Mudassar Ahmad, Muhammad Asif Habib:
Bottom up Approach for Better Requirements Elicitation. 60:1-60:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.