ThinkMind // ICSNC 2015, The Tenth International Conference on Systems and Networks Communications
 Type: conference Download: ICSNC 2015 cover page Download: ICSNC 2015 foreword page Download: ICSNC 2015 committee page Download: ICSNC 2015 table of contents Download: ICSNC 2015 full proceedings Notes: IARIA Conference. Editors: Carlos Becker Westphall, University of Santa Catarina, Brazil Eugen Borcoci, University Politehnica of Bucarest, Romania Sathiamoorthy Manoharan, University of Auckland, New Zealand Event editions: - there are 12 editions. ISSN: 2163-9027 ISBN: 978-1-61208-439-8 Location: Barcelona, Spain Dates: from November 15, 2015 to November 20, 2015 Articles: there are 25 articles Detecting Malicious Mobile Applications in Android OS Sun Teck Tan and Choon Rui Tan keywords: malicious applications; Android OS; Pattern matching.
A Two-Tiered User Feedback-based Approach for Spam Detection Malik Feroze, Zubair Baig, and Michael Johnstone keywords: Spam detection, user feedback, classification
Supporting a Variety of Secure Services Based on MTM Seungyong Yoon, Yongsung Jeon, and Jeongnyeo Kim keywords: secure service; mobile security
Implementation of Netflow based Interactive Connection Traceback System Jung-Tae Kim, Ik-Kyun Kim, and Koo-Hong Kang keywords: Peer-to-Peer; Connection Traceback; Interactive Hacking; Timing-based Traceback
Conducting and Identifying Penetration Attacks Using Linux Based Systems Aparicio Carranza, German Calle, Gin Pena, Jose Camacho, Harrison Carranza, and Yeraldina Estrella keywords: Kali Linux, CAINE, Pentesting, Computer Forensics, Metasploit
Adaptive Bitstream Prioritization for Dual TCP/UDP Streaming of HD Video Arul N Dhamodaran, Mohammed Sinky, and Ben Lee keywords: Bitstream Prioritization; HD Video Streaming; TCP; UDP.
Jitter Analysis of LTE Traffic over MPLS Based Evolved Packet Core Network Hussien Mahmoud and Hussein Elsayed keywords: LTE; EPC;MPLS; NS-3; Jitter
Choosing Multicast Configuration with Forward Error Correction for Mobile Multiaccess Heterogeneous Users Svetlana Boudko and Wolfgang Leister keywords: Wireless networking, mobile network selection, multicast, forward error correction
Classification of Node Localization Techniques in Wireless Sensor Networks Mekelleche Fatiha and Haffaf Hafid keywords: wireless sensor networks; localization; location nodes; multilateration.
Development of an IoT-based System for Real Time Occupational Exposure Monitoring Houssem Eddine Fathallah, Vincent Lecuire, Eric Rondeau, and Stéphane Le Calvé keywords: Air quality; sensor networks; Internet of Things; personal exposure; real time monitoring.
Fault-Tolerant Breach-Free Sensor Networks Jorge Cobb and Chin-Tser Huang keywords: Stabilization; Sensor networks; Sensor barriers
Performance Analysis of Association Procedure in IEEE 802.11ah Pranesh Sthapit, Santosh Subedi, Goo-Rak Kwon, and Jae-Young Pyun keywords: IEEE 802.11ah; association delay; Machine-to-Machine communication
Secure Dynamic Access Control Mechanism for Shared Wireless Sensor Networks Nelka Perera, Kasun Zoysa, Jeevani Goonathillake, and Asanka Sayakkara keywords: Shared wireless sensor networks; user access control; public key cryptography; symmetric cryptography
CAMAW: A Clustering Algorithm for Multiple Applications in WSAN Elton Alves da Costa, Claudio Miceli de Farias, Luci Pirmez, and Flávia Coimbra Delicato keywords: Application-aware; Wireless sensor networks; multiple applications
Intelligent Vehicular Security System using Sensors and GPS Ahmed Zuhair, Mansoor Ali, and Ali Al-Humairi keywords: Microcontroller; Security; GPS; GSM.
A k-Resilient Node Deployment Scheme Using an Air Vehicle in Wireless Sensor Networks Daehee Kim and Sunshin An keywords: node deployment; k-resilience; air vehicle; WSNs
Efficient Partial Decoding Algorithm for High Efficiency Video Coding Dokyung Lee and Jechang Jeong keywords: HEVC; Video codec; Partial decoding; Low resolution decoding
Categorization of Technologies used for Fingerprint-Based Indoor Localization Mário Melo and Gibeon Aquino keywords: indoor localization;fingerprint; technologies;
SDL Implementation of LTE UE Non-Seamless Random Access Procedure Handling Mohamed Yousef, Hussein Elsayed, and Abdelhalim Zekry keywords: LTE; random access procedure; MAC Sub-layer; non successful random access response; non successful contention resolution; SDL
Bulk Data Transfers through an Airline Delay-Tolerant Network Christina M. Malliou, Nikolaos Bezirgiannidis, and Vassilis Tsaoussidis keywords: Delay/Disruption Tolerant Networking; Airport network; Sneakernet; Bulk data; Contact Graph Routing.
Intelligence-based Routing for Smarter and Enhanced Opportunistic Network Operations Bassem Mokhtar and Mostafa Mokhtar keywords: Opportunistic Networks; Semantic-driven Operation; Routing Protocol; Context Awareness; Network Semantic, Information Management.
An Experimental Study of RFID Adoption for Maritime Activities Yasuhiro Sato, Akira Nishikiyama, Kohei Shimada, and Yoshinori Matsuura keywords: Radiofrequency identification, RFID tags, Marine safety, Marine accidents
Comparing TCP Congestion Control Algorithms Based on Passively Collected Packet Traces Toshihiko Kato, Atsushi Oda, Celimuga Wu, and Satoshi Ohzahata keywords: TCP congestion control; passive monitoring; congestion window.
Middleware Architectures for RFID Systems: A Survey Haitham Hamza, Mohamed Maher, Shourok Alaa, Aya Khattab, Hadeal Ismail, and Kamilia Hosny keywords: Middleware; Semantic middleware; Interoperability, Internet of Things (IoT)
A Novel Path Computing Framework under QoX Constraints Based on N&PV Functions Embedding. Xavier Hesselbach, Juan Felipe Botero, and Jose Roberto Amazonas keywords: Network functions virtualization; software defined network; paths algebra; QoX constraints.
|