Home // ICNS

ICNS 2020, The Sixteenth International Conference on Networking and Services

Type: conference

Notes: IARIA Conference.

Editors:
Eugen Borcoci, University POLITEHNICA Bucharest, Romania
Mary Luz Mouronte López, Universidad Francisco de Vitoria - Madrid, Spain

ISSN: 2308-4006

ISBN: 978-1-61208-786-3

Location: Lisbon, Portugal

Dates: from September 27, 2020 to October 1, 2020

Articles: there are 10 articles

GuideMe: A Networked Application for Indoor Orientation and Guidance
Eirini Barri, Christos Bouras, Apostolos Gkamas, Christina Koulouri, Evangelos Michos, and Spyridon Aniceto Katsampiris Salgado
keywords: GuideMe; indoor navigation; trilateration; pathfinding; UWB; BLE: people with special needs.

Resource Allocation Mechanism for Massive MIMO
Christos Bouras, Vasileios Kokkinos, and Christina Koulouri
keywords: Massive MIMO; 5G; Knapsack Problem; wireless users; resource block;

Text to Speech through Bluetooth for People with Special Needs Navigation
Eirini Barri, Christos Bouras, Apostolos Gkamas, Christina Koulouri, Evangelos Michos, and Spyridon Aniceto Katsampiris Salgado
keywords: GuideMe; GPS; BLE; TTS; indoor; navigation; trilateration; pathfinding; audio; voice;

Calculation of Location Probabilities for Agent-based Target Tracking System
Masaru Shiozuka, Tappei Yotsumoto, Kenichi Takahashi, Takao Kawamura, and Kazunori Sugahara
keywords: Agent; Target Tracking; Camera; Monitoring Systems.

Dynamic Intrusion Deception in a Cloud Environment
Chia-Chi Teng, Aaron Cowley, and Russel Havens
keywords: Cloud Computing; Intrusion Detection; Intrusion Deception; Honeypot; Honeynet

On Business Models for Vehicle-to-Everything Systems Based on 5G Slicing
Eugen Borcoci, Marius Vochin, and Serban Obreja
keywords: Vehicle-to-Everthing; 2X; 5G slicing; Business models; Stakeholders; Management and Orchestration; Software Defined Networking; Network Function Virtualization; Service management.

Meshed Trees for Resilient Switched Networks
Peter Willis and Nirmala Shenoy
keywords: Meshed trees, Layer 2 Fault Tolerance

An Authentication Technique to Handle DDoS Attacks in Proxy-Based Architecture
Poonam Dharam and Jarin Musarrat
keywords: Distributed Denial of Service; proxy-based architecture; flooding attacks.

Towards Stable and Hybrid UDP-TCP Relay Routing for Streaming and VoIP Services
Salim Mohamed and Osama Mohammed
keywords: UDP streaming; relay characteristics; Internet measurements.

Towards Securing Big Data on Software Defined Network: Performance Aware Architecture Design
Ahmed Alghamdi
keywords: Big Data; Big data security; Hadoop; Software Defined Network