


default search action
Honoring: Mohammad S. Obaidat , 2022
- Petros Nicopolitidis, Sudip Misra, Laurence T. Yang, Bernard P. Zeigler, Zhaolng Ning:

Advances in Computing, Informatics, Networking and Cybersecurity - A Book Honoring Professor Mohammad S. Obaidat's Significant Scientific Contributions. Lecture Notes in Networks and Systems 289, Springer 2022, ISBN 978-3-030-87048-5
Computing
- Georgios L. Stavrinides, Helen D. Karatza

:
Workload Scheduling in Fog and Cloud Environments: Emerging Concepts and Research Directions. 3-32 - B. John Oommen

, Xuan Zhang, Lei Jiao:
A Comprehensive Survey of Estimator Learning Automata and Their Recent Convergence Results. 33-52 - Zhikui Chen, Liang Zhao, Qiucen Li, Xin Song, Jianing Zhang:

Multimodal Data Fusion. 53-91 - Fernando Díaz-del-Río, Daniel Cagigas-Muñiz

, Jose-Luis Guisado-Lizar, José Luis Sevillano-Ramos:
Efficient Parallel Implementation of Cellular Automata and Stencil Computations in Current Processors. 93-120 - A. Dimou, C. Iliopoulos, E. Polytidou, Sanjay K. Dhurandher, Georgios Papadimitriou, Petros Nicopolitidis:

A Comprehensive Review on Edge Computing: Focusing on Mobile Users. 121-152
Informatics
- Arpit Singh

, Subhas Chandra Misra, Sameer Kumar:
Smart Healthcare: Rough Set Theory in Predicting Heart Disease. 155-180 - Jiacun Wang:

Healthcare Patient Flow Modeling and Analysis with Timed Petri Nets. 181-204 - Amtul Waheed, Jana Shafi, Parimala Venkata Krishna:

Enabling and Enforcing Social Distancing Measures at Smart Parking Infrastructures Using Blockchain Technology in COVID-19. 205-213 - Ruggero Donida Labati, Angelo Genovese

, Vincenzo Piuri, Fabio Scotti
:
Touchless Palmprint and Fingerprint Recognition. 267-298 - Konstantinos Astropekakis, Emmanouil Drakakis, Konstantinos Grammatikakis, Christos Goumopoulos:

A Survey of IoT Software Platforms. 299-326
Networking
- Thompson Stephan, S. Punitha, Achyut Shankar, Naveen Chilamkurti:

FLER: Fuzzy Logic-Based Energy Efficient Routing for Wireless Sensor Networks. 329-343 - Ala'a Al-Habashna

, Gabriel A. Wainer
:
Application of Device-to-Device Communication in Video Streaming for 5G Wireless Networks. 345-371 - Xiaohu Ge

, J. Yang, J. Ye:
5G Green Network. 373-420 - Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:

Geocommunity Based Data Forwarding in Social Delay Tolerant Networks. 421-442 - Polyzois Soumplis, Panagiotis C. Kokkinos, Aristotelis Kretsis, Petros Nicopolitidis, Georgios Papadimitriou, Emmanouel A. Varvarigos

:
Resource Allocation Challenges in the Cloud and Edge Continuum. 443-464 - Shupeng Wang, Zhaolong Ning:

Collaborative Caching Strategy in Content-Centric Networking. 465-511 - Yash Modi

, Mihir Panchal, Jitendra Bhatia, Sudeep Tanwar:
Blockchain-Based Software-Defined Vehicular Networks for Intelligent Transportation System Beyond 5G. 513-533 - Abdon Serianni, Floriano De Rango:

Application Layer Protocols for Internet of Things. 535-558 - Franco Davoli, Mario Marchese:

Resource Allocation in Satellite Networks - From Physical to Virtualized Network Functions. 559-580
Cybersecurity
- Man Chun Chow, Maode Ma:

Secure D2D in 5G Cellular Networks: Architecture, Requirements and Solutions. 583-616 - Izzat Alsmadi, Lo'ai Tawalbeh:

New Waves of Cyber Attacks in the Time of COVID19. 617-630 - Arpit Singh

, Subhas C. Misra:
A Comparison of Performance of Rough Set Theory with Machine Learning Techniques in Detecting Phishing Attack. 631-650 - Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati:

Towards Owner-Controlled Data Sharing. 651-671 - Jana Shafi, Amtul Waheed, Parimala Venkata Krishna:

Emerging Role of Block Chain Technology in Maintaining the Privacy of Covid-19 Public Health Record. 673-684 - Farid Naït-Abdesselam, Asim Darwaish, Chafiq Titouna:

Malware Forensics: Legacy Solutions, Recent Advances, and Future Challenges. 685-710 - Tuncer I. Ören:

Security of Cyber-Physical-Social Systems: Impact of Simulation-Based Systems Engineering, Artificial Intelligence, Human Involvement, and Ethics. 711-732 - M. Satheesh Kumar, Jalel Ben-Othman

, K. G. Srinivasagan, P. Umarani:
Machine Learning Methods for Enhanced Cyber Security Intrusion Detection System. 733-754 - Tin-Yu Wu, Fu Jie Tey:

5G Network Slicing Security. 755-780 - Surendra Singh, Sachin Tripathi:

A Security-Driven Scheduling Model for Delay-Sensitive Tasks in Fog Networks. 781-807

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














