


default search action
24th CAMAD 2019: Limassol, Cyprus
- 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2019, Limassol, Cyprus, September 11-13, 2019. IEEE 2019, ISBN 978-1-7281-1016-5

- Nikolaos Astyrakakis

, Yannis Nikoloudakis
, Ioannis Kefaloukos
, Charalabos Skianis, Evangelos Pallis
, Evangelos K. Markakis:
Cloud-Native Application Validation & Stress Testing through a Framework for Auto-Cluster Deployment. 1-5 - George Hatzivasilis

, Panos Chatziadam, Nikos Petroulakis
, Sotiris Ioannidis, Matteo Mangini, Christos Kloukinas
, Artsiom Yautsiukhin
, Michalis Antoniou, Dimitrios G. Katehakis
, Marios Panayiotou:
Cyber Insurance of Information Systems: Security and Privacy Cyber Insurance Contracts for ICT and Helathcare Organizations. 1-6 - Ogerta Elezaj, Sule Yildirim Yayilgan

, Mohamed Abomhara, Prosper Kandabongee Yeng, Javed Ahmed
:
Data-Driven Intrusion Detection System for Small and Medium Enterprises. 1-7 - Panagiotis Georgakopoulos, Tafseer Akhtar, Stavros Kotsopoulos:

On Game Theory-Based Coordination Schemes for Mobile Small Cells. 1-5 - Othonas Soultatos, Manos Papoutsakis, Konstantinos Fysarakis

, George Hatzivasilis
, Manos Michalodimitrakis, George Spanoudakis, Sotiris Ioannidis:
Pattern-Driven Security, Privacy, Dependability and Interoperability Management of IoT Environments. 1-6 - Dimitrios Pliatsios

, Panagiotis G. Sarigiannidis
, Thanasis Liatifis
, Konstantinos Rompolos, Ilias Siniosoglou
:
A Novel and Interactive Industrial Control System Honeypot for Critical Smart Grid Infrastructure. 1-6 - Dimitrios Amaxilatis, Christos Tselios, Orestis Akrivopoulos

, Ioannis Chatzigiannakis
:
On the Design of a Fog Computing-Based, Driving Behaviour Monitoring Framework. 1-6 - Praveen Kumar Korrai, Eva Lagunas

, Shree Krishna Sharma, Symeon Chatzinotas
, Björn E. Ottersten:
Slicing Based Resource Allocation for Multiplexing of eMBB and URLLC Services in 5G Wireless Networks. 1-5 - George C. Hadjichristofi, George Varveris:

Visualizing and Aggregating Behavior for Trust Evaluation. 1-6 - Yusuf A. Sambo

, Gianluca C. Valastro, Giancarlo M. M. Patané, Metin Öztürk
, Sajjad Hussain, Muhammad Ali Imran
, Daniela Panno:
Motion Sensor-Based Small Cell Sleep Scheduling for 5G Networks. 1-5 - Brian McCarthy, Aisling O'Driscoll

:
OpenCV2X Mode 4: A Simulation Extension for Cellular Vehicular Communication Networks. 1-6 - Paolo Bellavista

, Luca Foschini
, Nicola Ghiselli
:
Analysis of Growth Strategies in Social Media: The Instagram Use Case. 1-7 - Samantha Gamboa

, Raghav Thanigaivel, Richard Rouil
:
System Level Evaluation of UE-to-Network Relays in D2D-Enabled LTE Networks. 1-7 - Madiha Shahzad, Josephina Antoniou

:
Quality of User Experience in 5G-VANET. 1-6 - David Guzman, Richard Schöffauer, Gerhard Wunder:

Predictive Network Control in Multi-Connectivity Mobility for URLLC Services. 1-7 - Hadi Saki, Nabeel Khan

, Maria G. Martini
, Moustafa M. Nasralla
:
Machine Learning Based Frame Classification for Videos Transmitted over Mobile Networks. 1-6 - Zsolt Krämer, Sándor Molnár, Szilárd Solymos, Attila Mihály:

On the Benefits of Multi-Domain Congestion Control in LTE Networks. 1-6 - Hajer Ben Rekhissa, Cécile Belleudy, Philippe Bessaguet:

Power Efficient Packet Scheduling for M2M Devices over LTE/LTE-A Technologies. 1-4 - Hugo Marques

, Paulo Marques, Jorge Ribeiro, Tiago Alves, Luis Pereira:
Experimental Evaluation of Cellular Networks for UAV Operation and Services. 1-6 - Konstantinos Karampidis, Spyros Panagiotakis

, Manos Vasilakis, Evangelos K. Markakis
, Giorgos Papadourakis
:
Industrial CyberSecurity 4.0: Preparing the Operational Technicians for Industry 4.0. 1-6 - Hasna Uddin, Marcia Gibson, Ghazanfar Ali Safdar, Tahera Kalsoom

, Naeem Ramzan
, Masood Ur Rehman
, Muhammad Ali Imran
:
IoT for 5G/B5G Applications in Smart Homes, Smart Cities, Wearables and Connected Cars. 1-5 - Vipindev Adat

, Ilias Politis
, Christos Tselios, Stavros Kotsopoulos:
Blockchain Enhanced SECRET Small Cells for the 5G Environment. 1-6 - Souvik Sengupta

, Sarang Kahvazadeh
, Xavi Masip-Bruin
, Jordi Garcia
:
SFDDM: A Secure Distributed Database Management in Combined Fog-to-Cloud Systems. 1-7 - Gerhard Hasslinger, Konstantinos Ntougias, Frank Hasslinger, Oliver Hohlfeld:

Fast and Efficient Web Caching Methods Regarding the Size and Performance Measures per Data Object. 1-7 - Kyriakos Kritikos

, Manos Papoutsakis, Sotiris Ioannidis, Kostas Magoutis:
Towards Configurable Vulnerability Assessment in the Cloud. 1-6 - Hassan Malik

, Jeffrey Leonel Redondo Sarmiento, Muhammad Mahtab Alam, Muhammad Ali Imran
:
Narrowband-Internet of Things (NB-IoT): Performance Evaluation in 5G Heterogeneous Wireless Networks. 1-6 - Hussein Chour, Youssef Nasser, Faouzi Bader, Oussama Bazzi:

Game-Theoretic Based Power Allocation for a Full Duplex D2D Network. 1-7 - Konstantinos Lampropoulos

, Giorgos Georgakakos, Sotiris Ioannidis:
Using Blockchains to Enable Big Data Analysis of Private Information. 1-6 - Liviu-Adrian Hirtan, Piotr Krawiec

, Ciprian Dobre
, Jordi Mongay Batalla
:
Blockchain-Based Approach for e-Health Data Access Management with Privacy Protection. 1-7 - Rozeta Draghici

, Alexandra Rusu, Gabriel Ioan Prada
, Anna Marie Herghelegiu
, Lidia Bajenaru
, Ciprian Dobre
, Constandinos X. Mavromoustakis, Susanna Spinsante, Jordi Mongay Batalla
, Horacio González-Vélez
:
Acceptability of Digital Quality of Life Questionnaire Corroborated with Data from Tracking Devices. 1-6 - Nikolaos Vakakis

, Odysseas Nikolis, Dimosthenis Ioannidis
, Konstantinos Votis
, Dimitrios Tzovaras
:
Cybersecurity in SMEs: The Smart-Home/Office Use Case. 1-7 - Habib Mohammed Hussien

, Konstantinos Katzis, Luzango Pangani Mfupe, Ephrem T. Bekele:
Coexistence of TV White Space Devices and DTV Services in Ethiopian Geolocation White Space Spectrum Database. 1-5 - Attai Ibrahim Abubakar, Metin Öztürk

, Sajjad Hussain, Muhammad Ali Imran
:
Q-Learning Assisted Energy-Aware Traffic Offloading and Cell Switching in Heterogeneous Networks. 1-6 - Dimitra Chamou, Petros Toupas

, Eleni Ketzaki
, Stavros Papadopoulos, Konstantinos M. Giannoutakis
, Anastasios Drosou, Dimitrios Tzovaras
:
Intrusion Detection System Based on Network Traffic Using Deep Neural Networks. 1-6 - Chao Liu, Emmanuel Kieffer, Pascal Bouvry

:
On Fairness Optimization for Cloud Radio Access Networks. 1-5 - Grace Khayat, Constandinos X. Mavromoustakis, Jordi Mongay Batalla

, George Mastorakis, Hoda W. Maalouf, Mithun Mukherjee:
Tuning the Uplink Success Probability in Damaged Critical Infrastructure for VANETs. 1-6 - Péter Hegyi, József Varga

:
Telco Cloud Simulator. 1-7 - Zohaib Ahmed, Syed Muhammad Danish, Hassaan Khaliq Qureshi, Marios Lestas:

Protecting IoTs from Mirai Botnet Attacks Using Blockchains. 1-6 - Daniel Gaetano Riviello

, Francesco Di Stasio:
Analysis of Circular and Cylindrical Array Arrangements for mmWave 5G Beamforming Techniques. 1-4 - Nabajeet Barman

, Nabeel Khan
, Maria G. Martini
:
Analysis of Spatial and Temporal Information Variation for 10-Bit and 8-Bit Video Sequences. 1-6 - Konstantinos Loupos

, Bora Caglayan, Alexandros Papageorgiou, Basile Starynkevitch, Franck Védrine, Christos Skoufis, Stelios Christofi, Bill Karakostas, Antonis Mygiakis
, George Theofilis, Andrea Chiappetta, Harris Avgoustidis, George Boulougouris:
Cognition Enabled IoT Platform for Industrial IoT Safety, Security and Privacy - The CHARIOT Project. 1-4 - Tamara K. Al-Shayea, Jordi Mongay Batalla

, Constandinos X. Mavromoustakis, George Mastorakis:
Embedded Dynamic Modification for Efficient Watermarking Using Different Medical Inputs in IoT. 1-6 - Georgios Spanos

, Konstantinos M. Giannoutakis, Konstantinos Votis
, Dimitrios Tzovaras:
Combining Statistical and Machine Learning Techniques in IoT Anomaly Detection for Smart Homes. 1-6 - Giuseppe Portaluri, Mike Oluwatayo Ojo

, Stefano Giordano
, Marialaura Tamburello, Giuseppe Caruso:
Open CLORO: An Open Testbed for Cloud Robotics. 1-5 - Javier Augusto-Gonzalez, Anastasija Collen

, Spyridon C. Evangelatos
, Marios Anagnostopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis
, Dimitrios Tzovaras, Béla Genge, Erol Gelenbe, Niels A. Nijdam:
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. 1-6 - Jung-In Kim, Seung-Jae Lee

, Sang-Hyun Lee, Jong-Han Kim, Woon-Haing Hur:
Test Framework for Communication Protocol Stack Software. 1-4 - Kiraseya Preusser

, Michael Reyer, Anke Schmeink:
Network Planning for Indoor Joint LTE and WLAN Networks. 1-6 - Intidhar Bedhief

, Luca Foschini
, Paolo Bellavista
, Meriem Kassar, Taoufik Aguili:
Toward Self-Adaptive Software Defined Fog Networking Architecture for IIoT and Industry 4.0. 1-5 - Tafseer Akhtar, Ilias Politis

, Panagiotis Georgakopoulos, Stavros Kotsopoulos:
Efficient Radio Resource Management Scheme in Cooperative Network using Coalition Game. 1-6 - Eftychia Lakka, Nikolaos E. Petroulakis

, George Hatzivasilis
, Othonas Soultatos, Manolis Michalodimitrakis, Urszula Rak, Karolina Waledzik, Darko Anicic, Vivek Kulkarni:
End-to-End Semantic Interoperability Mechanisms for IoT. 1-6 - Ahmed Elbery, Hossam S. Hassanein

, Nizar Zorba, Hesham A. Rakha
:
VANET-Based Smart Navigation for Emergency Evacuation and Special Events. 1-6 - Georgios Efstathopoulos, Panagiotis I. Radoglou-Grammatikis

, Panagiotis G. Sarigiannidis
, Vasilis Argyriou, Antonios Sarigiannidis, Konstantinos Stamatakis, Michail K. Angelopoulos, Solon K. Athanasopoulos:
Operational Data Based Intrusion Detection System for Smart Grid. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














