All Stories

  1. Deep learning frameworks for cognitive radio networks: Review and open research challenges
  2. Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories
  3. Post-Quantum Secure Handover Mechanism for Next-Generation Aviation Communication Networks
  4. A critical analysis of the industrial device scanners’ potentials, risks, and preventives
  5. A systematic review of cybersecurity assessment methods for HTTPS
  6. Formal Verification and Security Assessment of the Drone Remote Identification Protocol
  7. Trustworthy Device Identifiers For Unmanned Aircraft and Other Mobile Things
  8. GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems
  9. A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints
  10. Peer-to-Peer Misbehavior Reporting Using Non-Interactive Zero-Knowledge Proofs for Intelligent Transport Systems
  11. AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications
  12. An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
  13. Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT
  14. KDC Placement Problem in Secure VPLS Networks
  15. A user-centric privacy-preserving authentication protocol for IoT-AmI environments
  16. QUIC Throughput and Fairness over Dual Connectivity
  17. Provide secure communications for IoT and Industrial Devices
  18. Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
  19. Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
  20. Towards 6G-Enabled Internet of Vehicles: Security and Privacy
  21. Vendor-Independent Software-Defined Networking
  22. Secure Drone Identification with Hyperledger Iroha
  23. Intrusion Detection in Automatic Dependent Surveillance-Broadcast (ADS-B) with Machine Learning
  24. Towards 5G-Enabled Self Adaptive Green and Reliable Communication in Intelligent Transportation System
  25. Toward Convergence of AI and IoT for Energy-Efficient Communication in Smart Homes
  26. A Security Model for Controller-Pilot Data Communication Link
  27. Controller Pilot Data Link Communication Security: A Practical Study
  28. IoT and HIP's Opportunistic Mode
  29. Decentralized Firmware Attestation for In-Vehicle Networks
  30. QUIC Throughput and Fairness over Dual Connectivity
  31. The Roadmap to 6G Security and Privacy
  32. A Comparative Simulation Study of Deterministic and Stochastic Strategies for Reduction of Packet Reordering in Multipath Data Streaming
  33. Aviation Scenarios for 5G and Beyond
  34. Simulating ADS-B Attacks in Air Traffic Management
  35. Demonstrating ADS-B AND CPDLC Attacks with Software-Defined Radio
  36. Intelligent intrusion detection system in smart grid using computational intelligence and machine learning
  37. Cloud-Based Driver Monitoring System Using a Smartphone
  38. Methodology and Mobile Application for Driver Behavior Analysis and Accident Prevention
  39. Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients
  40. A lightweight portable intrusion detection communication system for auditing applications
  41. Machine Learning Meets Communication Networks: Current Trends and Future Challenges
  42. A Joint Transmission Power Control and Duty-Cycle Approach for Smart Healthcare System
  43. Location–Price Competition in Mobile Operator Market
  44. Decentralized Firmware Attestation for In-Vehicle Networks
  45. Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks
  46. Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs
  47. Transparent CoAP Services to IoT Endpoints through ICN Operator Networks
  48. Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices
  49. Security for 5G and Beyond
  50. Trends and Detection Avoidance of Internet-Connected Industrial Control Systems
  51. Context-Oriented Competence Management in Expert Networks
  52. Controller–Pilot Data Link Communication Security
  53. Overview of 5G Security Challenges and Solutions
  54. A Comprehensive Guide to 5G Security
  55. Hardening Opportunistic HIP
  56. Software defined VPLS architectures: Opportunities and challenges
  57. Fast Transmission Mechanism for Secure VPLS Architectures
  58. Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services
  59. Smart Spaces-Based Application Development
  60. Analysis of deployment challenges of Host Identity Protocol
  61. CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things
  62. Analysis of the state of information security on the basis of surious emission electronic components
  63. Anonymous Secure Framework in Connected Smart Home Environments
  64. On the Resiliency of Static Forwarding Tables
  65. Nash Bargaining Solution Allocation is Not Suitable for Datacenter Jobs
  66. Secure communication channel architecture for Software Defined Mobile Networks
  67. Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes
  68. Access Control Protocol With Node Privacy in Wireless Sensor Networks
  69. NFV security considerations for cloud-based mobile virtual network operators
  70. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security
  71. Performance and security evaluation of intra-vehicular communication architecture
  72. Poster Abstract: An Efficient Authentication Model in Smart Grid Networks
  73. The quest for resilient (static) forwarding tables
  74. The Quest for Privacy in the Internet of Things
  75. Software Defined Mobile Networks
  76. Secure and Efficient Reactive Video Surveillance for Patient Monitoring
  77. Improving the tunnel management performance of secure VPLS architectures with SDN
  78. Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques
  79. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments
  80. Secure and Efficient Automatic Ruling in Three-Level Network Architecture
  81. Leveraging LTE security with SDN and NFV
  82. Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems
  83. A Simulation Study of the Stochastic Compensation Effect for Packet Reordering in Multipath Data Streaming
  84. Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks
  85. isBF: Scalable in-packet bloom filter based multicast
  86. Software Defined Mobile Networks (SDMN)
  87. Towards software defined cognitive networking
  88. Implementation of OpenFlow based cognitive radio network architecture: SDN&R
  89. Secure Virtual Private LAN Services: An overview with performance evaluation
  90. Proxy-based end-to-end key establishment protocol for the Internet of Things
  91. STEM+: Allocating bandwidth fairly to tasks
  92. Secure Hierarchical VPLS Architecture for Provider Provisioned Networks
  93. Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
  94. Security in Software Defined Networks: A Survey
  95. Service Intelligence and Communication Security for Ambient Assisted Living
  96. Service Intelligence Support for Medical Sensor Networks in Personalized Mobile Health Systems
  97. Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach
  98. How penalty leads to improvement: A measurement study of wireless backoff in IEEE 802.11 networks
  99. Delegation-based robust authentication model for wireless roaming using portable communication devices
  100. Securing swarm intellect robots with a police office model
  101. SDN Core for Mobility between Cognitive Radio and 802.11 Networks
  102. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications
  103. A novel distributed spanning tree protocol for provider provisioned VPLS networks
  104. Access Point selection game for mobile wireless users
  105. Securing the control channel of software-defined mobile networks
  106. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
  107. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications
  108. Addressing a secure session-key scheme for mobility supported e-Healthcare systems
  109. Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures
  110. An efficient and simple key distribution scheme for smart environments
  111. Trust and Reputation Mechanisms for Multi-agent Robotic Systems
  112. A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks
  113. Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core
  114. Enabling Secure Mobility with OpenFlow
  115. SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control
  116. Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario
  117. Secure hierarchical Virtual Private LAN Services for provider provisioned networks
  118. A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
  119. Cooperative security in distributed networks
  120. A scalable and secure VPLS architecture for provider provisioned networks
  121. Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography
  122. Securing virtual private LAN service by efficient key management
  123. isBF
  124. Hierarchical architectures in structured peer-to-peer overlay networks
  125. A layered encryption mechanism for networked critical infrastructures
  126. Computing the Retransmission Timeout in CoAP
  127. Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges
  128. Structured Peer-to-Peer Systems
  129. Demand-aware flow allocation in data center networks
  130. Mediating Multimedia Traffic with Strict Delivery Constraints
  131. Realization of Mobile Femtocells: Operational and Protocol Requirements
  132. Secured VPN Models for LTE Backhaul Networks
  133. Inter Technology Load Balancing Algorithm for Evolved Packet System
  134. An Adaptive Backoff Protocol with Markovian Contention Window Control
  135. Lightweight host and user authentication protocol for All-IP telecom networks
  136. Scalable architecture for multimedia multicast Internet applications
  137. Secure and Multihomed Vehicular Femtocells
  138. Securing Medical Sensor Network with HIP
  139. Survey on Congestion Control Mechanisms for Wireless Sensor Networks
  140. Secure Resolution of End-Host Identifiers for Mobile Clients
  141. Performance analysis of HIP diet exchange for WSN security establishment
  142. CR-Chord: Improving lookup availability in the presence of malicious DHT nodes
  143. DISPUTE: Distributed puzzle tussle
  144. Comparison and Analysis of Secure Mobile Architecture (SMA) and Evolved Packet System
  145. Improving TCP-Friendliness for mHIP
  146. Survey on hierarchical routing schemes in “flat” distributed hash tables
  147. Secure and usable P2P VoIP for mobile devices
  148. Brief announcement
  149. A secure peer-to-peer web framework
  150. Playing Defense by Offense: Equilibrium in the DoS-attack problem
  151. Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP)
  152. Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks
  153. Securing web content
  154. On calibrating enterprise switch measurements
  155. Distributed user authentication in wireless LANs
  156. Performance of Host Identity Protocol on Symbian OS
  157. Towards behavioral control in multi-player network games
  158. Usable security management with host identity protocol
  159. Collaborative Reputation-based Voice Spam Filtering
  160. Filtering SPAM in P2PSIP Communities with Web of Trust
  161. Host Identity Protocol (HIP)
  162. Hi3: An efficient and secure networking architecture for mobile hosts
  163. Performance analysis of general backoff protocols
  164. Performance of host identity protocol on lightweight hardware
  165. On scalability properties of the Hi3 control plane
  166. Modeling wireless links for transport protocols
  167. Multi-layer protocol tracing in a GPRS network