default search action
Honoring: Mohammad S. Obaidat , 2022
- Petros Nicopolitidis, Sudip Misra, Laurence T. Yang, Bernard P. Zeigler, Zhaolng Ning:
Advances in Computing, Informatics, Networking and Cybersecurity - A Book Honoring Professor Mohammad S. Obaidat's Significant Scientific Contributions. Lecture Notes in Networks and Systems 289, Springer 2022, ISBN 978-3-030-87048-5
Computing
- Georgios L. Stavrinides, Helen D. Karatza:
Workload Scheduling in Fog and Cloud Environments: Emerging Concepts and Research Directions. 3-32 - B. John Oommen, Xuan Zhang, Lei Jiao:
A Comprehensive Survey of Estimator Learning Automata and Their Recent Convergence Results. 33-52 - Zhikui Chen, Liang Zhao, Qiucen Li, Xin Song, Jianing Zhang:
Multimodal Data Fusion. 53-91 - Fernando Díaz-del-Río, Daniel Cagigas-Muñiz, Jose-Luis Guisado-Lizar, José Luis Sevillano-Ramos:
Efficient Parallel Implementation of Cellular Automata and Stencil Computations in Current Processors. 93-120 - A. Dimou, C. Iliopoulos, E. Polytidou, Sanjay K. Dhurandher, Georgios Papadimitriou, Petros Nicopolitidis:
A Comprehensive Review on Edge Computing: Focusing on Mobile Users. 121-152
Informatics
- Arpit Singh, Subhas Chandra Misra, Sameer Kumar:
Smart Healthcare: Rough Set Theory in Predicting Heart Disease. 155-180 - Jiacun Wang:
Healthcare Patient Flow Modeling and Analysis with Timed Petri Nets. 181-204 - Amtul Waheed, Jana Shafi, Parimala Venkata Krishna:
Enabling and Enforcing Social Distancing Measures at Smart Parking Infrastructures Using Blockchain Technology in COVID-19. 205-213 - Ruggero Donida Labati, Angelo Genovese, Vincenzo Piuri, Fabio Scotti:
Touchless Palmprint and Fingerprint Recognition. 267-298 - Konstantinos Astropekakis, Emmanouil Drakakis, Konstantinos Grammatikakis, Christos Goumopoulos:
A Survey of IoT Software Platforms. 299-326
Networking
- Thompson Stephan, S. Punitha, Achyut Shankar, Naveen Chilamkurti:
FLER: Fuzzy Logic-Based Energy Efficient Routing for Wireless Sensor Networks. 329-343 - Ala'a Al-Habashna, Gabriel A. Wainer:
Application of Device-to-Device Communication in Video Streaming for 5G Wireless Networks. 345-371 - Xiaohu Ge, J. Yang, J. Ye:
5G Green Network. 373-420 - Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Geocommunity Based Data Forwarding in Social Delay Tolerant Networks. 421-442 - Polyzois Soumplis, Panagiotis C. Kokkinos, Aristotelis Kretsis, Petros Nicopolitidis, Georgios Papadimitriou, Emmanouel A. Varvarigos:
Resource Allocation Challenges in the Cloud and Edge Continuum. 443-464 - Shupeng Wang, Zhaolong Ning:
Collaborative Caching Strategy in Content-Centric Networking. 465-511 - Yash Modi, Mihir Panchal, Jitendra Bhatia, Sudeep Tanwar:
Blockchain-Based Software-Defined Vehicular Networks for Intelligent Transportation System Beyond 5G. 513-533 - Abdon Serianni, Floriano De Rango:
Application Layer Protocols for Internet of Things. 535-558 - Franco Davoli, Mario Marchese:
Resource Allocation in Satellite Networks - From Physical to Virtualized Network Functions. 559-580
Cybersecurity
- Man Chun Chow, Maode Ma:
Secure D2D in 5G Cellular Networks: Architecture, Requirements and Solutions. 583-616 - Izzat Alsmadi, Lo'ai Tawalbeh:
New Waves of Cyber Attacks in the Time of COVID19. 617-630 - Arpit Singh, Subhas C. Misra:
A Comparison of Performance of Rough Set Theory with Machine Learning Techniques in Detecting Phishing Attack. 631-650 - Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati:
Towards Owner-Controlled Data Sharing. 651-671 - Jana Shafi, Amtul Waheed, Parimala Venkata Krishna:
Emerging Role of Block Chain Technology in Maintaining the Privacy of Covid-19 Public Health Record. 673-684 - Farid Naït-Abdesselam, Asim Darwaish, Chafiq Titouna:
Malware Forensics: Legacy Solutions, Recent Advances, and Future Challenges. 685-710 - Tuncer I. Ören:
Security of Cyber-Physical-Social Systems: Impact of Simulation-Based Systems Engineering, Artificial Intelligence, Human Involvement, and Ethics. 711-732 - M. Satheesh Kumar, Jalel Ben-Othman, K. G. Srinivasagan, P. Umarani:
Machine Learning Methods for Enhanced Cyber Security Intrusion Detection System. 733-754 - Tin-Yu Wu, Fu Jie Tey:
5G Network Slicing Security. 755-780 - Surendra Singh, Sachin Tripathi:
A Security-Driven Scheduling Model for Delay-Sensitive Tasks in Fog Networks. 781-807
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.